, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000900500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4fc000, &(0x7f0000000200), 0x0, 0x0) 23:26:24 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:24 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019001700500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019002300500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3fc, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:25 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019002d00500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019004800500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:25 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x540000, &(0x7f0000000200), 0x0, 0x0) 23:26:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019004c00500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:25 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:26 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019006000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3fd, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:26 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019006800500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019006c00500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:26 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x970000, &(0x7f0000000200), 0x0, 0x0) 23:26:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019007400500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:27 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019007a00500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3fe, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:27 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900e000500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900fc00500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:28 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xc04a01, &(0x7f0000000200), 0x0, 0x0) 23:26:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000003500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:28 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900ea03500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x402, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:28 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019001004500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:29 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000005500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xc04f00, &(0x7f0000000200), 0x0, 0x0) 23:26:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000006500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:29 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000007500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x479, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:29 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000009500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000410500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:30 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xf04a00, &(0x7f0000000200), 0x0, 0x0) 23:26:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000017500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:30 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x0, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900001f500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x500, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x0, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000020500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x0, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000023500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:31 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfeffff, &(0x7f0000000200), 0x0, 0x0) 23:26:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900002d500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:31 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x0, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900003f500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb00, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:32 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x0, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000040500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000048500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:32 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:32 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1000000, &(0x7f0000000200), 0x0, 0x0) 23:26:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900004c500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:33 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x26d9, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000060500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:33 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:33 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000068500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:33 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900006c500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:33 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x14ac000, &(0x7f0000000200), 0x0, 0x0) 23:26:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000074500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:34 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x0, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:34 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x26ef, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900007a500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:34 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x0, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:34 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900ffe0500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:34 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x0, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:34 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x0, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190003ea500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:35 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x0, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000fc500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:26:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000200), 0x0, 0x0) 23:26:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x26fb, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000fff500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:35 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x0, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:26:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900e0ff500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:36 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:26:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x0, r2, 0xa) 23:26:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000250100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 625.550174] ieee802154 phy0 wpan0: encryption failed: -22 [ 625.556056] ieee802154 phy1 wpan1: encryption failed: -22 23:26:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3000000, &(0x7f0000000200), 0x0, 0x0) 23:26:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000002500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:36 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:26:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x0, r2, 0xa) 23:26:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3800, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:36 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:26:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000003500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x0, r2, 0xa) 23:26:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000004500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r3}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0xa) 23:26:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x0, r2, 0xa) 23:26:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000005500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r3}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0xa) 23:26:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4000000, &(0x7f0000000200), 0x0, 0x0) 23:26:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000006500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r3}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0xa) 23:26:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r3}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0xa) 23:26:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000007500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000008500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x0, r2, 0xa) 23:26:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0x0) 23:26:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000009500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000017500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r3}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0xa) 23:26:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4fd0100, &(0x7f0000000200), 0x0, 0x0) 23:26:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0x0) 23:26:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000023500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900002d500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0x0) 23:26:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7b00, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:39 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0x0) 23:26:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000048500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:39 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0x0) 23:26:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900004c500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r3}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0xa) 23:26:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000060500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x5000000, &(0x7f0000000200), 0x0, 0x0) 23:26:40 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0x0) 23:26:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000068500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r3}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0xa) 23:26:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900006c500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x72e05cd9, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:40 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x0, r2, 0xa) 23:26:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000074500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:26:40 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x0, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900007a500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:41 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x5fd0100, &(0x7f0000000200), 0x0, 0x0) 23:26:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000e0500100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000250100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x72e05cdf, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:41 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x0, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500200000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500300000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x0, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:42 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500400000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x6000000, &(0x7f0000000200), 0x0, 0x0) 23:26:42 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x0, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500500000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:42 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500700000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500800000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:43 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500900000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 632.747783] Bluetooth: hci5: command 0x0406 tx timeout 23:26:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x6fd0100, &(0x7f0000000200), 0x0, 0x0) 23:26:43 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500a00000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500f00000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:44 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000501000000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 633.529264] wlan0: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 23:26:44 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000501300000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7000000, &(0x7f0000000200), 0x0, 0x0) 23:26:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000501400000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:44 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000506300000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff88804c990818, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500003000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050f803000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7fd0100, &(0x7f0000000200), 0x0, 0x0) 23:26:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050f903000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:46 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050fb03000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff88804c990ab8, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500204000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:46 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x0, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500c04000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:46 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500d04000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x8000000, &(0x7f0000000200), 0x0, 0x0) 23:26:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}]}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000501204000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}]}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000501304000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000501404000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, &(0x7f0000000280)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}]}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r3}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000501504000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r3}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 23:26:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x8fd0100, &(0x7f0000000200), 0x0, 0x0) 23:26:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050ad26000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050e126000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050e226000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050e326000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000280)) [ 638.059088] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:26:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050003c000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 638.346409] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x9fd0100, &(0x7f0000000200), 0x0, 0x0) 23:26:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050007f000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 638.741184] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500081000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="630000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 639.142958] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500082000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500083000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 639.459503] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xa000000, &(0x7f0000000200), 0x0, 0x0) 23:26:50 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:26:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:26:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500084000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 639.737067] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500085000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:50 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, 0xffffffffffffffff) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 640.019577] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500086000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:51 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 640.357555] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xafd0100, &(0x7f0000000200), 0x0, 0x0) 23:26:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500087000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, 0xffffffffffffffff) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:26:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:51 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500088000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 640.899891] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500089000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="fbffffff8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, 0xffffffffffffffff) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:26:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050008a000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 641.360233] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1f000000, &(0x7f0000000200), 0x0, 0x0) 23:26:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, 0xffffffffffffffff) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:26:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005000f2000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 641.916556] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001080000000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:53 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500102000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 642.322748] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:53 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 642.615406] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x20000000, &(0x7f0000000200), 0x0, 0x0) 23:26:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500103000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(0xffffffffffffffff, r0) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:26:53 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 642.970006] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500104000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:26:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500105000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 643.261804] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 643.577094] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x48000000, &(0x7f0000000200), 0x0, 0x0) 23:26:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500106000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:54 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 643.952353] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500107000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500108000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 644.301557] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 644.696628] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4c000000, &(0x7f0000000200), 0x0, 0x0) 23:26:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500109000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 645.101539] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500117000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:56 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500123000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 645.447597] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050012d000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 645.808466] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x68000000, &(0x7f0000000200), 0x0, 0x0) 23:26:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:56 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500148000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 646.124832] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200500008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050014c000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:26:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 646.506391] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500160000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 646.884260] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x6c000000, &(0x7f0000000200), 0x0, 0x0) 23:26:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500168000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:57 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:26:58 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x540b, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000058240)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000058440)={0x0, 0x0, "31be51bf2eac2ff21d0ae0895f6410b568e8c9a868c2af15ebe402617d443bc8e064090cc7175c563533860c1e48dbc6c347fccbdd95c12dc1f5843f169e30bcef42eaff9698dcc1fa12476172ed7fc6f39a417ecafff07bf570b9320efce721ec355cdfdb93d939ea301f392eead215818720ce0282e44a70dbe839a1e6305bbf9e8425c8ca126ff25698719136a9964adbd0127ded3ded4102fae0b95522f68fcbd810b59aba4920fd3fde1f1d2cbf33fc483e4bfe6f0ebb473ed70bc593aa535ab10126eab9fd241f486445239a8ea7df0312419d9f3b558a532781fa35b7c971b1ca06d9f3703f4099fc631604044d6665d3d779b87c673c24208580d90f", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=r3, @ANYBLOB="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"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001400)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050f40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x0, "08d8faa2b9d793"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000059440)={0x0, ""/256, 0x0, 0x0}) r7 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140)}, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000001680)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r7, 0xd000943e, &(0x7f0000001880)={0x0, r8, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=r9, @ANYBLOB="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"]) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001400)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000050f40)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "08d8faa2b9d793"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059640)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r12}], 0x3b, "852d56109383f5"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f000005a640)={0x0, 0x0, "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", "63d7caeaaec4e63e41c79f46dea519de0977cffeed9add6148623627d92213d9755d996976a4398cd5904b0dd07f3c1595ab72ce6b44c483d67a0d610e56d05dd056a12a48fea7b6731de335865605db7f6ebb4944c36fb274ff4c9b040caac3a576907b6cbd693c755dd3bd88b39701fe808763bb6e5464b7319c78fe7f5bbccc86f49ca4395296f9d977a6edf4af38c042abf69366b9087d2f9d4314e39743b72c42770f5378278cab23f3eecb2611dca11482086ef0548c85fa51402d505b57239df1035c9feb9223add004e87cb5a5d4a912cf993bf93e57a447ddbea734a9a48f48dc857a79df7ba7bfaf501dd4272c2b5e021abe4de1cfdd7e6cca63fbb220e3cea18a98050ff0cd9724cfdac808f9ae17688354382bcf23c14eb3b8e9f2b89fe273ececf5f9206c6464f5176351828ca4a5c9f93b6f7698d4b6470991e104168154999bd4175970d4b6f934e9c5ceda33c7e025f01a14e421c3bbcb83f9846d1ae70addd0bfc97e2fc18e9fda76df1a0aeaa74172186f5dc02a0e656f9dcb822bd8247cdcb99c66ca0917f297cacedfcb7725cbd4d7ee167ce8f22741700f03ab36f9e0f5048848597c23ed9553a0c1a3e5e3267082cd02842fcfafed9ac6430300ef47842512c0f167f05dd4b4af42c095fbbc3e85e8f1efb89ac91371e771af2114fd38695b4554ce2d948320d9b4d8e42be1b5399b1fffd64f74f594dd5cccea696339cf4a4d9d5946b0f940310f883e54dddcce12c392116818c8b43161cb4f8afbb9a8163e035acca7c4e08545b6addf498f1378ef66faa14e4eeb9cbd2b98d64b6e201e3f5d1f431a79101b463a1e635cb844900920c3bc4098c090b988f7ae1f67b8b95bc3c6dd99d5fbc9835bb4c46b2632f5f05752d4681537104990ae24341703637c2e406724fa1b109aed6f9ca75257c7fd7520da75c3ee6cf927c91edc3ef2ba239cd2edcda6af2b59486ea5ac54f550244c6527e7920ce31b2d604f1f9bce568b8a37c6d1ad6d2229ff715453ffb6c18bbf70c2ac2a5ba84ce6fae892b617fd8edee468d38a561cdd0416da1d7b68079f5a3766704cb06350c42c5d526d605c8f0ecafc615096a95f653bdabeefbeca9b8dcaaaa2081ddd2212e4dd3f70007ce3c87b8d1ebd9c5e4330648b8339114d5d1bc2020150696fcd213c2759290bbb389eb61875767a16fac04556232d3efe9cab27833fcd99f4e9e8c4b7696ca812282ef09d8448916ea7210c4ce64a36db7baa767fc68c8d9aabf647a1b965469f5a554d6a38b997c4b4ee59a860a38d9b3833754af805ff3191ee870a71bfacc79cb36e54c33a92c89fc108ef0ff653d7dbe7589e71c72b1d4640524c756b1e7380e5db05015d7226ed05d5a2c2370a2b16b5999c366f79ef4d0223ed310d9b1d8b95d6635a76f93a73c40bc5bd69a42e7977d00ba9449959c813fdf6d02103b0601b7d24fbc3ec710736a752cdd43b63e0bedd7ae9fc16d9ac5f55835fe3017ebc027d287e57b85f9db80ea11bc559f16c9c6244a18fa50d0d654562c3ed9456a12c485785222a1e48b24d1edd92c42abb0eee2a0d0a53d7e3e529a88ff3778b9bf6f2d87d7ffea97c273ca294387f6ca539970865397af239f6ab07058f6174ded6761d43a611d35158d69130cdde350555f79cb8235654f04cc4a51780c1ccf9587790c30921456bb052e4c3b54fb5e85f6fafed84ca4b51976f2756c7b0af9aa1c4f2736c90ae78fa05be72a7610fcbd3ba441a396ebbb79c2a09b9c59b8759571cbd97517f13ddbd9ecb4089d49892ab6f4b2648e3f2613de2e704af23c8cb4c649eb25970f2a237b8aa4ac67228fdc64365b608a6079e6885c6ee9b2bc6ee1885ae27571e40d91eb4a88215a48c3d2cc52a52d9ff044598a0a05733c2e7d0500436cff7ac8211234062dd2bf433b1d993b8a335857be2750f9f8c3eef5338860a507ba3b4b33d1ebfe7974dbe131966a094e19a5c20bb60057c1394b4623420c7b5c60197bd239e812f4116dcbf90a1d8776eac16dff58d8030ba3b8916d4bc6e6c12333a501435a3e7d3557e5d7821dbb65d5dfd0b2d3068bc506cc878e3d8fdf4f77ef2726d5de355728ca22b5910208b7e00063ba5c09bbf24b847bc64183df2feb2fe22a911448aac4661d3bbcea115c39683110264c8108bec51714c01003386b81082b3692cf1de5787ffb023ead565dd77b633f4832e156839f20dd9cc44c3292f940d730a47fef9c6427c87b4bc1da0476c42fd0ce5b61e323021148f1fa14c1373c8515d5e09fc623c5fa15cae7a685174960f1a1084e1dc554f2ffd8e7c90a68db189c8dd74c7a1d0121600f44c917d611392a11ecb99cc7a16978e1eeb99fafad9c90220416c8620fe976568456b0fa5236801451cd66d7eebd8f85d9999cb5f9142ab5ec37e664425c3e77b77660b1d353ede32db4ae11a536afa59365b0679336ad3fcf5cfd96db17ae1632d71712c691965e8e4d3018101d02e64328fd457947b51cc8d02ee4c115bb4f6165406ee6f6eb65b0b6e135a2c325f651ee4dcefc154488bc6dba139d0bbb0edb751046219239183b98e0721a074155d42f58cefb038b3f6d6777705c6c81de77e31e4e631387dc30c9980209999444c0d9cb4252ae1c94c6e8bb7c5dc915fb668843f75b1ab39610e2dc42d88c33f0e08ea5bf3ac4fb964d6f609da1c9294b497239845f53650b678a08e8fe898c4284b6bd2567fc73b24346f2609a6dbc1e1f8eb9e3f927a6a59540454577102ce3460f1ee21c963cbde71110a1e577e919c921f14add4a1e2389cb2d29fca2f13621f2c19483bf5267680995efb81f4ffdbf3927cc2da38e6e791a9320e8e7830a765c42f94cbeb48a6ffc1929122da489c11496fc9e515ac0b081619c30880c8c72a50a41b2312568ab189cc8b7c07e9bcc21bef0a20291199f88e538512ceafa86ca9c471bffd7803105cba6031c100945e493131b04cf7d7af1d33dc1e03ba1b997c548ef875c22a0a6d6c3cee3aae08e390adb689f2f25439bffc03c7dcc4e66e7906f3dfde9d17b9952d74517399a4ec7fa08ee82f7ecfcd10e917b3e8d758ddc6b7a5b9ff7e4eaf3fe20b179d54e2c992d715548cadf14266a0481d36fb622e0b5f6791f0d87455b641b3f8cdb1499db2668430e37350c04d665a4d550d0d2c39acc5379d7f57003e83e5b5ca235ff49d8d2cdadd14f10f4c1374920f12eb74ed8d568cdc59285317ca30a5f3e17512746a53fdcc30647d6c3f7e6a1b37e235dca8010c91736f8a6e5a3e86f0fb402d356eda59024431d493a420f676601f18c9952274f3260669d1fb0400f331dd1addd62d8b24e65dd711ddbc306026332432a0c5ad011984d99d694538d3fad170a06ac3fcaed1cd981dc8986e4d9fccecbf806f0bd27eb82fdaf9cdbe78ca7b3773db2016716156a6c0b6cee966d0db99796f51c69b2554464415afdfd1cf568ac2ace8de36c38ae7305f7ba45bea627f7db702f71dd91c7dfa2b7cd97ded63e66d811012ca52e6a11ae3c97737dbb934f8a612d4ea474a46ca2883ede209a430c47fa2fc8853f7f78ecd6c7d7af26fcbc6f30df4150248613656ba5054f10ad7132d20d0f636ad2da86e3c3374284166009533b6c8aba275878a97fdfcb8ca01498a7da2eec910215d0e246e9a521b6c477daad08078c4ca328e2514f55154b2958c705a5bdbb7b09bdf8a7d309a96a24a71a118d4cbe51f69a3009678fc377c93fc86db590d219af36072c5019a242215bc8ed55238835765a844a0580a62e8dcc9a0991c6c764682600b9b6e203725fce59b1d8f7471b26021e88feafb2f24caaa1f9ebe73d471792133b39aed69d3de50a45ea061cdf8546c4eb55263cdf32c3441f4e97112db79fdf2599e645cdded6060eeb0e20b7ccf8f353d10dcc838d5878e4252ba145b30e2db6cc53ae76be86a38a17ad60337d99ae409d25dbb02a2db4899a10745af017e73f04bb71f16367abf10a96a8c646e5c6709e5bdc6f4cd85c6162a186befdce2d8ec0a09e404ae0fc11a2146c94ea542c4ef92f946b8fa745787e5718711dea7203527e0c6423feb184db4842fce7bcb857d5ea5ad0b0c9d6f6e493849515fe70d1cce5a3214249408184fc89890f531e763c042c85990f015901a840d16fc859fbb0178222c7efe3d93bf23d548428760ffcd4c3b15fc2970c004ed4b83901c5248b61d1f61c5905820b7434d72dbbe5a06ae6c5d093ea14d53306ef9eac1eddb9c551f508c739c3f1473a1a1edd546bc6b241a9bcfb80e76d1500788cc329d789c0dec7641a7264d2a67a7015971e0c1ac3b1bc5aa17d1486f6505be3497543e40f334dc39b9a5d36572bd843fdb7d58f1deaf9e8c98478d8a62900ca74838d39fe59ef1be9adf5ab05d755f361860cfbaf6af3aa983500b496e193d581c11bf3fe101c40dac07686d892ed2be6798f7752632b8d9705fbc0f8461b1d73db7fff9a6a00caea03f533719ebaed1dcf6e40ad4985c7c9ea237f7e15feaf59f19a081b5dcaf0fd73ac09609de4e40a4219a940c562ab7b8ef59996f76d37027cd04909a64ee85869e42448be90cb52691b3ca45ed99b25e4c6bb12ed8de40d34d845ca1d28e72c5cd779f8cb3c65f93068e34a6b8072c5513365c81eae8234de1e22b8b5b3f98b4542c0646c1bae9ee1b2c63973d1140ecc7c40c9d3c187b7ba5935c9aa5efa3fabc30e9d032fe13a0e50a90a4c027096dfb99bcd78599fd3cced7f6553a8d8bedf8363d6c6e0cdb367d75e47badd7c7452921ad6b72d08f18f3cc95f5dd1a2313bcf28520715117f2001b919c9d0367e8f4a00974ceddd43cdb89432c4648ee532f70657a10c62033a4c0e4b76c94da3366557e5085db8bb3b5e2ef14b89d0b8b60bc593eabad8f376309327bfc94a9842ec2a50790f02de8c556c175d3986aa3d03c0d1d9e454e3cad4a6336476ffb23f50c8b7dd53a6c9d34ad81257702be466764ba7ac669d372bab0449e692c1e62db5d91239acac2e532c190acc9e4862b93a7f57f56322babade0af77c7703cc1251430f392454a054064e280b69fd7d144e87b4febaef33ad5ac41c8f7af2d4547106058ca1dbf007c8260aff54d9ba5ac100d5e78726e44f939fb10f109469964ca8644f43b3f78af1983d0f1ef7fed935389546ccc416fdaa008b1bb8732f55c2c578adfa6e86b31410ec678d7bd0cbb5913c7f90eb95294cc67f3cad3e036e1b9d2f587b70e590644a582a92b2fba8e17b3f3b0bbf3eb8370d99f4e61205c96aa2b727b04c9a1f7a3eb33400940b1ec9c4cd3da4e57c5df3a7df32dac09ca5fe0c06fcf7583063ca6f10343f50f3a772d26772ca61762823e811a82f4a0607d5f461a65bc08ed123c66204e790359"}) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f000005b640)={{0x0, 0x8000, 0x2, 0x7fff, 0x200, 0x4, 0xff, 0x8, 0x80000001, 0xe4d, 0x20, 0x1, 0x7d, 0x6, 0x100000001}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005c640)={0xfffffffffffffffa, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}, {0x0, r2}, {r3, r5}, {0x0, r6}, {r8}, {r9, r11}, {r14, r15}, {}, {r16}], 0x9, "03363aada05e82"}) [ 647.282020] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050016c000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:58 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:26:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200800008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:58 executing program 3: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x13, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) 23:26:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500174000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 647.624837] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x74000000, &(0x7f0000000200), 0x0, 0x0) 23:26:58 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDDISABIO(r0, 0x4b37) ioctl$TCFLSH(r0, 0x540b, 0x2) 23:26:58 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:26:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050017a000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:26:59 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x540b, 0x2) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x1) ioctl$TIOCCBRK(r1, 0x5428) [ 648.256247] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001e0000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:59 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x540b, 0x2) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x1) ioctl$TIOCCBRK(r1, 0x5428) 23:26:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:26:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 648.537227] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:26:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7a000000, &(0x7f0000000200), 0x0, 0x0) 23:26:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001fc000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:26:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="202d00008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:59 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2d000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:26:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 649.140460] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) [ 649.194742] EXT4-fs (loop5): Couldn't mount because of unsupported optional features (69060000) 23:27:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100030f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 649.576985] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001ea030f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 649.814921] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 649.993551] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x97ffffff, &(0x7f0000000200), 0x0, 0x0) 23:27:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="206800008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500110040f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 650.395013] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100050f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100060f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 650.741652] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100070f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 651.090196] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xd92116fc, &(0x7f0000000200), 0x0, 0x0) 23:27:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100090f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500104100f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 651.474730] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="205a01008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100170f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, 0xffffffffffffffff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, 0xffffffffffffffff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 651.805765] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001001f0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 652.158341] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xe4ffffff, &(0x7f0000000200), 0x0, 0x0) 23:27:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100200f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, 0xffffffffffffffff) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 652.569371] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100230f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200005008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001002d0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 652.975684] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r3, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r1, 0xa) 23:27:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001003f0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 653.509420] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f0000000200), 0x0, 0x0) 23:27:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100400f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r3, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r1, 0xa) 23:27:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200007008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r3, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r1, 0xa) 23:27:04 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100480f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 653.959129] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001004c0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 654.246328] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r3, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r1, 0xa) 23:27:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100600f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 654.600534] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100680f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:05 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfc1621d9, &(0x7f0000000200), 0x0, 0x0) 23:27:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="20001f008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:05 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001006c0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 655.006227] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100740f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 655.388454] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001007a0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001ffe00f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 655.757965] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfdfdffff, &(0x7f0000000200), 0x0, 0x0) 23:27:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="20002d008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:06 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500103ea0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 656.260872] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100fc0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050010fff0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 656.630016] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200048008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 656.933492] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfdffffff, &(0x7f0000000200), 0x0, 0x0) 23:27:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:07 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001e0ff0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="20004c008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 657.280483] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000003000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 657.540282] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:08 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000005000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 657.919152] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfeffffff, &(0x7f0000000200), 0x0, 0x0) 23:27:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000006000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200068008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000007000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 658.383604] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:09 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000009000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 658.681615] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 658.900995] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfffffdfd, &(0x7f0000000200), 0x0, 0x0) 23:27:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000a000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="20007a008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 659.441004] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000b000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) [ 659.808839] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000c000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:10 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:10 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000d000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 660.167307] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfffffe00, &(0x7f0000000200), 0x0, 0x0) 23:27:11 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000e000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) [ 660.573935] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100020f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 660.829618] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:11 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) 23:27:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100030f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 661.077203] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) 23:27:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xffffff97, &(0x7f0000000200), 0x0, 0x0) 23:27:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100040f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 661.491744] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100050f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r3, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r3, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) [ 661.777041] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100060f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100070f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 662.301717] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r3, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) 23:27:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100080f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 662.678682] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:13 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xffffffe4, &(0x7f0000000200), 0x0, 0x0) 23:27:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r3, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) 23:27:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100090f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:13 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r3, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r4}, 0x18, 0x0) 23:27:13 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100170f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 663.140064] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200023008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100230f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 663.468420] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001002d0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100480f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 663.843352] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:14 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfffffff6, &(0x7f0000000200), 0x0, 0x0) 23:27:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:14 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r2, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r1, r2) readv(r2, &(0x7f0000000380)=[{&(0x7f0000000000)=""/206, 0xce}, {&(0x7f0000000100)=""/80, 0x50}, {&(0x7f0000000180)=""/181, 0xb5}, {&(0x7f0000000240)=""/112, 0x70}, {&(0x7f00000002c0)=""/1, 0x1}, {&(0x7f0000000300)=""/121, 0x79}], 0x6) ioctl$TCFLSH(r0, 0x540b, 0x2) 23:27:14 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001004c0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 664.260423] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100600f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:15 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r2, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r1, r2) readv(r2, &(0x7f0000000380)=[{&(0x7f0000000000)=""/206, 0xce}, {&(0x7f0000000100)=""/80, 0x50}, {&(0x7f0000000180)=""/181, 0xb5}, {&(0x7f0000000240)=""/112, 0x70}, {&(0x7f00000002c0)=""/1, 0x1}, {&(0x7f0000000300)=""/121, 0x79}], 0x6) ioctl$TCFLSH(r0, 0x540b, 0x2) [ 664.543292] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) [ 664.558161] wlan0: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 23:27:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:15 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100680f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 664.830946] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:15 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r4, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfffffffd, &(0x7f0000000200), 0x0, 0x0) 23:27:16 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r4, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001006c0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200068008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 665.400184] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100740f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="20006c008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:16 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r4, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 665.798326] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001007a0f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 666.004199] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:16 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100e00f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 666.359469] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfffffffe, &(0x7f0000000200), 0x0, 0x0) 23:27:17 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r4, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000011000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 666.780682] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:17 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000012000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050010007cd000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 667.203453] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000000000800000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 667.568233] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:18 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x400000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:18 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000002000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 668.078746] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000003000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 668.390085] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000004000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 668.678464] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x540000000000, &(0x7f0000000200), 0x0, 0x0) [ 668.894327] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:19 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000005000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 669.200487] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000006000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000005000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:20 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000007000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 669.559334] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:20 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) socket$inet_udplite(0x2, 0x2, 0x88) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r4, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r3, r4) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}]}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 669.836063] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:20 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7efd479bc000, &(0x7f0000000200), 0x0, 0x0) 23:27:20 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000008000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:20 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) socket$inet_udplite(0x2, 0x2, 0x88) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r4, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r3, r4) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}]}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 670.264597] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000009000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:21 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000a000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 670.633045] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:21 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:21 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000b000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 671.008426] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:21 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7fffffffefff, &(0x7f0000000200), 0x0, 0x0) 23:27:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000c000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 671.341423] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:22 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000d000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 671.638074] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 671.886168] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000e000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:22 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000608000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:22 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000010000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7ffffffff000, &(0x7f0000000200), 0x0, 0x0) 23:27:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000011000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 672.409202] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:23 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000688000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:23 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 672.728046] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:23 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e0000190000005001000012000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 672.950037] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:24 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e00001900000050010000cd070000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 673.375308] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:24 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 673.698581] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x970000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f020000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:24 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f030000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 674.097174] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:24 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f040000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:25 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 674.426795] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f050000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f060000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:25 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) [ 674.909364] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:25 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f070000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 675.220605] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f080000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:26 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r4, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r3, r4) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r5, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) r6 = getpid() tkill(r6, 0x2f) [ 675.781447] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f090000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:26 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f170000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2000000000000, &(0x7f0000000200), 0x0, 0x0) [ 676.223821] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, 0x0, 0x7, r2, 0xa) 23:27:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f230000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:27 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r4, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r3, r4) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r5, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) r6 = getpid() tkill(r6, 0x2f) [ 676.689231] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f2d0000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r4, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r3, r4) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r5, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) r6 = getpid() tkill(r6, 0x2f) 23:27:27 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f480000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 677.067986] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000007c00000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f4c0000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 677.361355] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:28 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x2) 23:27:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x10400000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:28 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r4, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r4, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r3, r4) sendto$inet6(r4, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r5, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r5}, 0x18, 0x0) r6 = getpid() tkill(r6, 0x2f) 23:27:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f600000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:28 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x2) [ 677.776842] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:28 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x2) 23:27:28 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f680000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000028000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:28 executing program 4: ioctl$TCFLSH(0xffffffffffffffff, 0x5601, 0x2) [ 678.134778] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f6c0000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:29 executing program 4: ioctl$TCFLSH(0xffffffffffffffff, 0x5601, 0x2) 23:27:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 678.521823] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x20000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:29 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) r7 = getpid() tkill(r7, 0x2f) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, r7, 0x7, r2, 0xa) 23:27:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f740000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:29 executing program 4: ioctl$TCFLSH(0xffffffffffffffff, 0x5601, 0x2) 23:27:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:29 executing program 4: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(0xffffffffffffffff, 0x5601, 0x2) [ 678.799198] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:29 executing program 4: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(0xffffffffffffffff, 0x5601, 0x2) 23:27:29 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f7a0000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:30 executing program 4: syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(0xffffffffffffffff, 0x5601, 0x2) [ 679.184220] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000fe00000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:30 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) r7 = getpid() tkill(r7, 0x2f) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, r7, 0x7, r2, 0xa) 23:27:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xc04a0100000000, &(0x7f0000000200), 0x0, 0x0) 23:27:30 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x0) 23:27:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:30 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffc0000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 680.064440] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:30 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) r7 = getpid() tkill(r7, 0x2f) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, r7, 0x7, r2, 0xa) 23:27:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000300000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:31 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) r7 = getpid() tkill(r7, 0x2f) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, r7, 0x7, r2, 0xa) 23:27:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000fea0300000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 680.460549] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f100400000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000088000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:31 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) r7 = getpid() tkill(r7, 0x2f) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, r7, 0x7, r2, 0xa) 23:27:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xc04f0000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000500000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 681.141231] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r5, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) dup2(r4, r5) sendto$inet6(r5, &(0x7f0000000100)="188fb5ea0466ef4e025fb854c910bb6676868988c974630db50f133877e7c28bc4ead8e0c059b5381d3eb78d9c", 0x2d, 0x20, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x9}, 0x8) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setresuid(0x0, r6, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}, {0x7b, 0x7fff}], r6}, 0x18, 0x0) r7 = getpid() tkill(r7, 0x2f) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x7, 0xff, 0x0, 0x0, 0x20004, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x2, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x8, 0x1, 0xff, 0x7, 0x3}, r7, 0x7, r2, 0xa) 23:27:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000600000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 681.528421] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:32 executing program 4 (fault-call:1 fault-nth:0): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x0) 23:27:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000238000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000700000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:32 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x0) [ 682.010392] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="2000002d8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:33 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x2, 0x0) 23:27:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000900000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:33 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xc09b47fd7e0000, &(0x7f0000000200), 0x0, 0x0) 23:27:33 executing program 5 (fault-call:3 fault-nth:0): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f041000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:33 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b2f, 0x0) [ 682.432052] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) [ 682.493850] FAULT_INJECTION: forcing a failure. [ 682.493850] name failslab, interval 1, probability 0, space 0, times 0 [ 682.556367] CPU: 0 PID: 13059 Comm: syz-executor.5 Not tainted 4.19.177-syzkaller #0 [ 682.565175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.574534] Call Trace: [ 682.577141] dump_stack+0x1fc/0x2ef [ 682.580805] should_fail.cold+0xa/0xf [ 682.584614] ? setup_fault_attr+0x200/0x200 [ 682.588983] __should_failslab+0x115/0x180 [ 682.593231] should_failslab+0x5/0x10 [ 682.597038] kmem_cache_alloc_trace+0x284/0x380 [ 682.601733] sctp_association_new+0x79/0x1f10 [ 682.606238] ? __sanitizer_cov_trace_switch+0x4b/0x80 [ 682.611442] ? security_sctp_bind_connect+0x8f/0xc0 [ 682.616474] sctp_sendmsg_new_asoc+0x342/0x1040 [ 682.621157] ? sctp_endpoint_lookup_assoc+0x148/0x280 [ 682.626367] ? __sctp_setsockopt_connectx+0x1c0/0x1c0 [ 682.631574] ? lock_downgrade+0x720/0x720 [ 682.635738] ? rcu_is_watching+0x53/0xc0 [ 682.639846] sctp_sendmsg+0x1146/0x1580 [ 682.643847] ? sctp_id2assoc+0x260/0x260 [ 682.647921] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 682.652788] ? retint_kernel+0x2d/0x2d [ 682.656699] inet_sendmsg+0x132/0x5a0 [ 682.660515] ? inet_recvmsg+0x5c0/0x5c0 [ 682.664508] sock_sendmsg+0xc3/0x120 [ 682.668237] __sys_sendto+0x21a/0x320 [ 682.672047] ? __ia32_sys_getpeername+0xb0/0xb0 [ 682.676734] ? lock_downgrade+0x720/0x720 [ 682.680914] ? vfs_write+0x3d7/0x540 [ 682.684653] ? check_preemption_disabled+0x41/0x280 [ 682.689684] ? vfs_write+0x393/0x540 [ 682.693435] ? fput+0x2b/0x190 [ 682.696646] ? ksys_write+0x1c8/0x2a0 [ 682.700465] __x64_sys_sendto+0xdd/0x1b0 [ 682.704566] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 682.709162] do_syscall_64+0xf9/0x620 [ 682.712978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.718177] RIP: 0033:0x465ef9 [ 682.721395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 682.740311] RSP: 002b:00007f158f27c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 682.748033] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 23:27:33 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b30, 0x0) 23:27:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 682.755311] RDX: 0000000000000001 RSI: 0000000020847fff RDI: 0000000000000004 [ 682.762618] RBP: 00007f158f27c1d0 R08: 000000002005ffe4 R09: 000000000000001c [ 682.769903] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 682.777274] R13: 00007ffe2c0cf06f R14: 00007f158f27c300 R15: 0000000000022000 23:27:33 executing program 5 (fault-call:3 fault-nth:1): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f001700000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:33 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b31, 0x0) [ 682.935727] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) [ 683.002443] FAULT_INJECTION: forcing a failure. [ 683.002443] name failslab, interval 1, probability 0, space 0, times 0 [ 683.016365] CPU: 0 PID: 13086 Comm: syz-executor.5 Not tainted 4.19.177-syzkaller #0 [ 683.025699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.035075] Call Trace: [ 683.037773] dump_stack+0x1fc/0x2ef [ 683.041440] should_fail.cold+0xa/0xf [ 683.045255] ? setup_fault_attr+0x200/0x200 [ 683.049599] __should_failslab+0x115/0x180 [ 683.053850] should_failslab+0x5/0x10 [ 683.057661] kmem_cache_alloc_trace+0x284/0x380 [ 683.062350] flex_array_alloc+0x1f4/0x2c0 [ 683.066608] sctp_stream_alloc_out+0x39/0x4b0 [ 683.071150] ? sctp_stream_init+0x82/0x5a0 [ 683.075417] sctp_stream_init+0x214/0x5a0 [ 683.079607] ? __raw_spin_lock_init+0x28/0x100 [ 683.084225] sctp_association_new+0x1146/0x1f10 [ 683.088926] sctp_sendmsg_new_asoc+0x342/0x1040 [ 683.093613] ? sctp_endpoint_lookup_assoc+0x148/0x280 [ 683.098831] ? __sctp_setsockopt_connectx+0x1c0/0x1c0 [ 683.104065] ? lock_downgrade+0x720/0x720 [ 683.108230] ? lock_acquire+0x170/0x3c0 [ 683.112244] ? check_preemption_disabled+0x41/0x280 [ 683.117290] sctp_sendmsg+0x1146/0x1580 [ 683.121280] ? sctp_id2assoc+0x260/0x260 [ 683.125947] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 683.125978] ? retint_kernel+0x2d/0x2d [ 683.126004] inet_sendmsg+0x132/0x5a0 [ 683.126020] ? security_socket_sendmsg+0x83/0xb0 23:27:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 683.126032] ? inet_recvmsg+0x5c0/0x5c0 [ 683.126047] sock_sendmsg+0xc3/0x120 [ 683.126063] __sys_sendto+0x21a/0x320 23:27:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f001f00000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 683.126078] ? __ia32_sys_getpeername+0xb0/0xb0 [ 683.126094] ? lock_downgrade+0x720/0x720 [ 683.126109] ? vfs_write+0x3d7/0x540 [ 683.126132] ? check_preemption_disabled+0x41/0x280 [ 683.126150] ? vfs_write+0x393/0x540 [ 683.126166] ? fput+0x2b/0x190 [ 683.126179] ? ksys_write+0x1c8/0x2a0 [ 683.126201] __x64_sys_sendto+0xdd/0x1b0 [ 683.126217] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 683.126230] do_syscall_64+0xf9/0x620 [ 683.126245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.126258] RIP: 0033:0x465ef9 [ 683.126272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 683.126279] RSP: 002b:00007f158f27c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 683.126293] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 683.126301] RDX: 0000000000000001 RSI: 0000000020847fff RDI: 0000000000000004 [ 683.126309] RBP: 00007f158f27c1d0 R08: 000000002005ffe4 R09: 000000000000001c [ 683.126317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 683.126325] R13: 00007ffe2c0cf06f R14: 00007f158f27c300 R15: 0000000000022000 23:27:34 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xf04a0000000000, &(0x7f0000000200), 0x0, 0x0) [ 683.331631] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:34 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b32, 0x0) 23:27:34 executing program 5 (fault-call:3 fault-nth:2): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000608000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f002000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 683.635471] FAULT_INJECTION: forcing a failure. [ 683.635471] name failslab, interval 1, probability 0, space 0, times 0 23:27:34 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b33, 0x0) [ 683.713087] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) [ 683.736177] CPU: 1 PID: 13124 Comm: syz-executor.5 Not tainted 4.19.177-syzkaller #0 [ 683.744100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.753730] Call Trace: [ 683.756379] dump_stack+0x1fc/0x2ef [ 683.760050] should_fail.cold+0xa/0xf [ 683.763864] ? setup_fault_attr+0x200/0x200 [ 683.768200] ? lock_acquire+0x170/0x3c0 [ 683.772212] __should_failslab+0x115/0x180 [ 683.776547] should_failslab+0x5/0x10 [ 683.780370] kmem_cache_alloc_trace+0x284/0x380 [ 683.785068] sctp_auth_shkey_create+0x65/0x190 [ 683.789662] sctp_auth_asoc_copy_shkeys+0x1fb/0x2c0 [ 683.794702] sctp_association_new+0x1587/0x1f10 [ 683.799403] sctp_sendmsg_new_asoc+0x342/0x1040 [ 683.804127] ? sctp_endpoint_lookup_assoc+0x148/0x280 [ 683.809374] ? __sctp_setsockopt_connectx+0x1c0/0x1c0 [ 683.814588] ? lock_downgrade+0x720/0x720 [ 683.818752] ? lock_acquire+0x170/0x3c0 [ 683.822744] ? check_preemption_disabled+0x41/0x280 [ 683.827821] sctp_sendmsg+0x1146/0x1580 [ 683.831849] ? sctp_id2assoc+0x260/0x260 [ 683.835936] ? check_preemption_disabled+0x41/0x280 [ 683.840975] ? aa_sk_perm+0x534/0x930 [ 683.844806] inet_sendmsg+0x132/0x5a0 [ 683.848623] ? security_socket_sendmsg+0x83/0xb0 [ 683.853404] ? inet_recvmsg+0x5c0/0x5c0 [ 683.857412] sock_sendmsg+0xc3/0x120 [ 683.861141] __sys_sendto+0x21a/0x320 [ 683.864975] ? __ia32_sys_getpeername+0xb0/0xb0 [ 683.869854] ? __schedule+0x88f/0x2040 [ 683.873799] ? io_schedule_timeout+0x140/0x140 [ 683.878444] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 683.883233] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 683.888024] ? retint_kernel+0x2d/0x2d [ 683.891957] __x64_sys_sendto+0xdd/0x1b0 [ 683.896037] ? do_syscall_64+0xe9/0x620 [ 683.900055] do_syscall_64+0xf9/0x620 [ 683.903878] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.909084] RIP: 0033:0x465ef9 [ 683.912288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 683.931207] RSP: 002b:00007f158f27c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 683.938957] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 683.946940] RDX: 0000000000000001 RSI: 0000000020847fff RDI: 0000000000000004 [ 683.954252] RBP: 00007f158f27c1d0 R08: 000000002005ffe4 R09: 000000000000001c 23:27:34 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b34, 0x0) [ 683.961710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 683.968991] R13: 00007ffe2c0cf06f R14: 00007f158f27c300 R15: 0000000000022000 23:27:34 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f002300000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:34 executing program 5 (fault-call:3 fault-nth:3): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:34 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b35, 0x0) 23:27:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f002d00000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 684.438755] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xf0ffffff7f0000, &(0x7f0000000200), 0x0, 0x0) 23:27:35 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b36, 0x0) [ 684.568492] FAULT_INJECTION: forcing a failure. [ 684.568492] name failslab, interval 1, probability 0, space 0, times 0 [ 684.582144] CPU: 1 PID: 13175 Comm: syz-executor.5 Not tainted 4.19.177-syzkaller #0 [ 684.590105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.590118] Call Trace: [ 684.602096] dump_stack+0x1fc/0x2ef [ 684.605792] should_fail.cold+0xa/0xf [ 684.605811] ? setup_fault_attr+0x200/0x200 [ 684.614040] ? lock_acquire+0x170/0x3c0 [ 684.614061] __should_failslab+0x115/0x180 [ 684.622264] should_failslab+0x5/0x10 [ 684.626081] kmem_cache_alloc_trace+0x284/0x380 [ 684.630773] sctp_add_bind_addr+0x77/0x370 [ 684.635045] sctp_copy_one_addr.part.0+0xe7/0x120 [ 684.639934] sctp_bind_addr_copy+0x1b8/0x470 [ 684.644393] sctp_sendmsg_new_asoc+0x367/0x1040 [ 684.649080] ? rcu_nmi_exit+0xb3/0x180 [ 684.652990] ? __sctp_setsockopt_connectx+0x1c0/0x1c0 [ 684.658222] ? retint_kernel+0x2d/0x2d [ 684.662135] sctp_sendmsg+0x1146/0x1580 [ 684.666130] ? sctp_id2assoc+0x260/0x260 [ 684.670205] ? check_preemption_disabled+0x41/0x280 [ 684.675240] ? aa_sk_perm+0x534/0x930 [ 684.679077] inet_sendmsg+0x132/0x5a0 [ 684.682890] ? security_socket_sendmsg+0x83/0xb0 [ 684.687653] ? inet_recvmsg+0x5c0/0x5c0 [ 684.691645] sock_sendmsg+0xc3/0x120 [ 684.695373] __sys_sendto+0x21a/0x320 [ 684.699214] ? __ia32_sys_getpeername+0xb0/0xb0 [ 684.703907] ? __mutex_unlock_slowpath+0xea/0x610 [ 684.708779] ? check_preemption_disabled+0x41/0x280 [ 684.713829] ? vfs_write+0x393/0x540 [ 684.717559] ? fput+0x2b/0x190 [ 684.720866] ? ksys_write+0x1c8/0x2a0 [ 684.724691] __x64_sys_sendto+0xdd/0x1b0 [ 684.728771] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 684.733371] do_syscall_64+0xf9/0x620 [ 684.737221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.742423] RIP: 0033:0x465ef9 [ 684.745635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:27:35 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b37, 0x0) [ 684.764558] RSP: 002b:00007f158f27c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 684.772283] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 684.779566] RDX: 0000000000000001 RSI: 0000000020847fff RDI: 0000000000000004 [ 684.786855] RBP: 00007f158f27c1d0 R08: 000000002005ffe4 R09: 000000000000001c [ 684.794248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 684.801534] R13: 00007ffe2c0cf06f R14: 00007f158f27c300 R15: 0000000000022000 23:27:35 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f003f00000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:35 executing program 5 (fault-call:3 fault-nth:4): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="2000006c8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:35 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b3a, 0x0) [ 685.077371] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) [ 685.088327] FAULT_INJECTION: forcing a failure. [ 685.088327] name failslab, interval 1, probability 0, space 0, times 0 23:27:35 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b3b, 0x0) [ 685.128303] CPU: 1 PID: 13198 Comm: syz-executor.5 Not tainted 4.19.177-syzkaller #0 [ 685.136248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.145705] Call Trace: [ 685.148368] dump_stack+0x1fc/0x2ef [ 685.152027] should_fail.cold+0xa/0xf [ 685.155843] ? setup_fault_attr+0x200/0x200 [ 685.160177] ? lock_acquire+0x170/0x3c0 [ 685.164258] __should_failslab+0x115/0x180 [ 685.168520] should_failslab+0x5/0x10 [ 685.172335] kmem_cache_alloc_trace+0x284/0x380 [ 685.177022] sctp_transport_new+0x71/0x710 [ 685.181281] sctp_assoc_add_peer+0x2a6/0x1050 [ 685.185792] ? sctp_bind_addr_copy+0x209/0x470 [ 685.190411] sctp_sendmsg_new_asoc+0x580/0x1040 [ 685.195101] ? sctp_endpoint_lookup_assoc+0x148/0x280 [ 685.200311] ? __sctp_setsockopt_connectx+0x1c0/0x1c0 [ 685.205522] ? lock_downgrade+0x720/0x720 [ 685.209685] ? lock_acquire+0x1ec/0x3c0 [ 685.213673] ? check_preemption_disabled+0x41/0x280 [ 685.218713] sctp_sendmsg+0x1146/0x1580 [ 685.222707] ? sctp_id2assoc+0x260/0x260 [ 685.226780] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.231552] ? retint_kernel+0x2d/0x2d [ 685.235456] ? inet_sendmsg+0x4e/0x5a0 [ 685.239371] inet_sendmsg+0x132/0x5a0 [ 685.243194] ? security_socket_sendmsg+0x83/0xb0 [ 685.247966] ? inet_recvmsg+0x5c0/0x5c0 [ 685.251967] sock_sendmsg+0xc3/0x120 [ 685.255700] __sys_sendto+0x21a/0x320 [ 685.259527] ? __ia32_sys_getpeername+0xb0/0xb0 [ 685.264250] ? lock_downgrade+0x720/0x720 [ 685.268419] ? vfs_write+0x3d7/0x540 [ 685.272184] ? check_preemption_disabled+0x41/0x280 [ 685.277230] ? vfs_write+0x393/0x540 [ 685.280983] ? fput+0x2b/0x190 [ 685.284189] ? ksys_write+0x1c8/0x2a0 [ 685.288012] __x64_sys_sendto+0xdd/0x1b0 [ 685.292093] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 685.296707] do_syscall_64+0xf9/0x620 [ 685.300533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.305738] RIP: 0033:0x465ef9 [ 685.308944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 23:27:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f004000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 685.327903] RSP: 002b:00007f158f27c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 685.335638] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 685.342928] RDX: 0000000000000001 RSI: 0000000020847fff RDI: 0000000000000004 [ 685.350657] RBP: 00007f158f27c1d0 R08: 000000002005ffe4 R09: 000000000000001c [ 685.357945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 685.365256] R13: 00007ffe2c0cf06f R14: 00007f158f27c300 R15: 0000000000022000 23:27:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:36 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b3c, 0x0) 23:27:36 executing program 5 (fault-call:3 fault-nth:5): r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) [ 685.553998] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) [ 685.723948] FAULT_INJECTION: forcing a failure. [ 685.723948] name failslab, interval 1, probability 0, space 0, times 0 [ 685.754729] CPU: 1 PID: 13234 Comm: syz-executor.5 Not tainted 4.19.177-syzkaller #0 [ 685.762665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.772043] Call Trace: [ 685.774653] dump_stack+0x1fc/0x2ef [ 685.778299] should_fail.cold+0xa/0xf [ 685.782127] ? setup_fault_attr+0x200/0x200 [ 685.786471] ? lock_acquire+0x170/0x3c0 [ 685.790470] __should_failslab+0x115/0x180 [ 685.794734] should_failslab+0x5/0x10 [ 685.798544] kmem_cache_alloc_trace+0x284/0x380 [ 685.803235] sctp_stream_init_ext+0x47/0x1f0 [ 685.807672] ? sctp_sendmsg_to_asoc+0x16e0/0x1ea0 [ 685.812537] sctp_sendmsg_to_asoc+0x1728/0x1ea0 [ 685.817236] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 685.821838] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.826625] ? rcu_nmi_exit+0xb3/0x180 [ 685.830535] ? sctp_sendmsg_check_sflags+0x2e0/0x2e0 [ 685.835698] ? sctp_sendmsg_update_sinfo+0x11e/0x4c0 [ 685.840825] ? sctp_sendmsg_update_sinfo+0x1ef/0x4c0 [ 685.845968] sctp_sendmsg+0xe23/0x1580 [ 685.849977] ? sctp_id2assoc+0x260/0x260 [ 685.854075] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.858868] ? retint_kernel+0x2d/0x2d [ 685.862794] inet_sendmsg+0x132/0x5a0 [ 685.866631] ? security_socket_sendmsg+0x83/0xb0 [ 685.871533] ? inet_recvmsg+0x5c0/0x5c0 [ 685.875613] sock_sendmsg+0xc3/0x120 [ 685.879349] __sys_sendto+0x21a/0x320 [ 685.883208] ? __ia32_sys_getpeername+0xb0/0xb0 [ 685.887895] ? lock_downgrade+0x720/0x720 [ 685.892064] ? vfs_write+0x3d7/0x540 [ 685.895802] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 685.900763] ? retint_kernel+0x2d/0x2d [ 685.904855] ? __sys_sendto+0x11/0x320 [ 685.908764] __x64_sys_sendto+0xdd/0x1b0 [ 685.912844] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 685.917451] do_syscall_64+0xf9/0x620 [ 685.921276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.926566] RIP: 0033:0x465ef9 [ 685.929860] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 685.948776] RSP: 002b:00007f158f27c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 685.956502] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 685.963791] RDX: 0000000000000001 RSI: 0000000020847fff RDI: 0000000000000004 [ 685.971082] RBP: 00007f158f27c1d0 R08: 000000002005ffe4 R09: 000000000000001c [ 685.978397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 685.985703] R13: 00007ffe2c0cf06f R14: 00007f158f27c300 R15: 0000000000022000 23:27:36 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xfeffff00000000, &(0x7f0000000200), 0x0, 0x0) 23:27:36 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b3d, 0x0) 23:27:36 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f004800000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="2000007a8000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:37 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b40, 0x0) 23:27:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f004c00000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 686.338086] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:37 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b41, 0x0) 23:27:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:37 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b44, 0x0) 23:27:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f006000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 686.619531] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 686.926315] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) [ 686.990301] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.996032] ieee802154 phy1 wpan1: encryption failed: -22 23:27:37 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x100000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:37 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b45, 0x0) 23:27:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='4', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:37 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f006800000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:38 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b46, 0x0) [ 687.318834] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f006c00000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:38 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b47, 0x0) 23:27:38 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b48, 0x0) 23:27:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x2, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) [ 687.683366] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f007400000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x200000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:38 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b49, 0x0) 23:27:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f007a00000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x3, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) [ 688.248790] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:39 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b4a, 0x0) 23:27:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000fffe000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:39 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b4b, 0x0) 23:27:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f03ea00000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 688.571184] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:39 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b4c, 0x0) 23:27:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x300000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:39 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b4d, 0x0) 23:27:39 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000fc0ed00000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x5, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:40 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b4e, 0x0) [ 689.303731] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f00fc00000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x6, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:40 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b52, 0x0) [ 689.560484] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:40 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b60, 0x0) 23:27:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f0fff00000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x400000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:40 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b61, 0x0) 23:27:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x7, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:40 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000fe0ff00000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:41 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b62, 0x0) [ 690.303569] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000002000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008004000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:41 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000004000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:41 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b63, 0x0) 23:27:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x8, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:41 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b64, 0x0) [ 690.648181] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:42 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4fd010000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000fffff1f000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:42 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b65, 0x0) 23:27:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x9, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:42 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b66, 0x0) 23:27:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f0000fc000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 691.389939] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:42 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b67, 0x0) 23:27:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:42 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b68, 0x0) 23:27:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0xa, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:42 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000010000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 691.751127] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x500000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:43 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b69, 0x0) 23:27:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000020000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0xb, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) [ 692.379616] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:43 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b6a, 0x0) 23:27:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000030000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0xc, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:43 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b6b, 0x0) [ 692.699759] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:43 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000040000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 692.991383] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x5fd010000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:44 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b6c, 0x0) 23:27:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0xd, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000050000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:44 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b6d, 0x0) [ 693.403689] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000060000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:44 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b70, 0x0) 23:27:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0xe, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:44 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b71, 0x0) 23:27:44 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000070000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 693.751471] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:45 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x600000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:45 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4b72, 0x0) 23:27:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000080000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0xf, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:45 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4bfa, 0x0) [ 694.345926] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000090000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:45 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4bfb, 0x0) 23:27:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="20000000804c000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x10, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:45 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5409, 0x0) 23:27:45 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000004100000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 694.662745] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:46 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x6fd010000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x11, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000170000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:46 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x540b, 0x0) 23:27:46 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x540c, 0x0) 23:27:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f0000001f0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 695.408414] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:46 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x540d, 0x0) 23:27:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:46 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000200000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 695.588250] wlan0: No active IBSS STAs - trying to scan for other IBSS networks with same SSID (merge) 23:27:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x12, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:46 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x540e, 0x0) [ 695.765241] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x700000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:47 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x540f, 0x0) 23:27:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000230000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x13, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:47 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5410, 0x0) 23:27:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f0000002d0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 696.444152] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:47 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5412, 0x0) 23:27:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x14, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:47 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f0000003f0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:47 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5413, 0x0) [ 696.762436] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7fd010000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:48 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5414, 0x0) 23:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000400000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x15, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:48 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5415, 0x0) 23:27:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000480000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 697.358884] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:48 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5416, 0x0) 23:27:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x16, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:48 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f0000004c0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:48 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5418, 0x0) [ 697.700789] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x800000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:49 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x541c, 0x0) 23:27:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000030006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000600000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x17, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:49 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x541d, 0x0) 23:27:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000680000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 698.363618] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:49 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x541e, 0x0) 23:27:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x18, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:49 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f0000006c0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:49 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5421, 0x0) [ 698.667624] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x8fd010000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000740000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:50 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5422, 0x0) 23:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x19, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) [ 699.337069] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f0000007a0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:50 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5423, 0x0) 23:27:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1a, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000060006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:50 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5424, 0x0) 23:27:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000fffffff8c0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:50 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5425, 0x0) [ 699.723561] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x9fd010000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1b, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:51 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5427, 0x0) 23:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000fffffff970000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:51 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5428, 0x0) 23:27:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f0000edc00000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:51 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5429, 0x0) [ 700.443013] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000090006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:51 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5437, 0x0) 23:27:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffc1621d90000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1c, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) [ 700.814804] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xa00000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:52 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5441, 0x0) 23:27:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000fffffffe00000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1d, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:52 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5450, 0x0) [ 701.478449] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000003ea0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:52 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5451, 0x0) 23:27:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1e, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:52 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffffffff50000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:52 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5452, 0x0) [ 701.905878] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0xafd010000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffffffff60000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:53 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x545d, 0x0) 23:27:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x21, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000200006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:53 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5460, 0x0) [ 702.573274] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffffffffb0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:53 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5600, 0x0) 23:27:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x22, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:53 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5602, 0x0) 23:27:53 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000fd92116fc0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 702.992221] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1f00000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:54 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5603, 0x0) 23:27:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x23, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffffffdfc0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:54 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5604, 0x0) [ 703.620960] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffffffdfd0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x24, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:54 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5605, 0x0) 23:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 704.024924] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffffffffd0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:54 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5606, 0x0) 23:27:55 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x25, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:55 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5607, 0x0) 23:27:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffffffffe0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:55 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5608, 0x0) [ 704.622266] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f00000fff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x26, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:55 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5609, 0x0) [ 704.952588] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:55 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f001fffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x27, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4800000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:56 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x560a, 0x0) 23:27:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffcfdffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x28, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:56 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x560b, 0x0) [ 705.564171] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffdfdffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:56 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x560c, 0x0) 23:27:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x29, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:56 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x560d, 0x0) 23:27:56 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f7fffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 705.955969] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x4c00000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:57 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x560e, 0x0) 23:27:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x2a, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f8cffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f97ffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 706.575479] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:57 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x560f, 0x0) 23:27:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:57 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x40049409, 0x0) 23:27:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x2b, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:57 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000fe0ffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:57 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x4020940d, 0x0) [ 706.912790] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:58 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x6800000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:58 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x80045432, 0x0) 23:27:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ff5ffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x2c, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:58 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x80045440, 0x0) [ 707.580991] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ff6ffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x2d, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:58 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0xc0045878, 0x0) 23:27:58 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0xc0045878, 0x0) [ 707.889226] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:58 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffbffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x6c00000000000000, &(0x7f0000000200), 0x0, 0x0) 23:27:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x2e, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:59 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0xc0189436, 0x0) 23:27:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffdffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 708.457784] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:59 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0xc020660b, 0x0) 23:27:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:27:59 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x4000) 23:27:59 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000ffeffffff0000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:27:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x2f, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:27:59 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x5400) [ 708.754539] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:27:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) [ 709.087323] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:28:00 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7400000000000000, &(0x7f0000000200), 0x0, 0x0) 23:28:00 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x5500) 23:28:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f00000000c0ed000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:28:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x30, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:28:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000014000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:28:00 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x9700) [ 709.581209] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:28:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:28:00 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x104000) 23:28:00 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000000000010000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:28:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x31, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:28:00 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x400000) [ 709.932391] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:28:00 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x401000) 23:28:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x7a00000000000000, &(0x7f0000000200), 0x0, 0x0) 23:28:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000000000020000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:28:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:28:01 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x4af000) 23:28:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x32, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:28:01 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x4fc000) [ 710.612688] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:28:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000000000040000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:28:01 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x540000) 23:28:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000000785000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:28:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x33, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:28:01 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x550000) [ 710.989621] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:28:01 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000fffffffffffff070000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:28:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x8000000000000000, &(0x7f0000000200), 0x0, 0x0) 23:28:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:28:02 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCFLSH(r0, 0x5601, 0x970000) 23:28:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x34, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:28:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000000000fc0000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 711.652495] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:28:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000000000000100000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:28:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="2000000080000007bd000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:28:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x35, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) 23:28:02 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000000000000200000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) [ 712.142720] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:28:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000008000020006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b000000800000000800000052470669cf33f69ae8a2cf138bfe4e6b807e5fe9823e2009703bc67ef03a83d9ecd64f5ccebe1eab5cb11f54501a32ce54e0caf5acac708fc5c923a6ae9a1d7c5ddf06d7becdf6bc87cd2fe4391b6f3f3939f50ac2ee33045ac04cadde2ebbc9484409ddee5a7b284b11ac8c8bf2454393f03e2f9207b2f42e9f5f7b4e1af90a638c8a521b934d04af3c61946b4f7b80169d941b50719556837b9e0850f866b047", 0x101, 0x400}], 0x0, &(0x7f0000000540)=ANY=[]) 23:28:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x36, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) [ 712.447168] EXT4-fs (loop2): Couldn't mount because of unsupported optional features (69060000) 23:28:03 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000040)="20000000020e000019000000500100000f000000000000000300000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000180)={[{@resgid={'resgid', 0x3d, 0xffffffffffffffff}}]}) 23:28:03 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x97ffffff00000000, &(0x7f0000000200), 0x0, 0x0) 23:28:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x37, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = dup2(r0, r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=@v3={0x3000000, [{0x3d, 0x1}], r4}, 0x18, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x1, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x0, 0x8, 0x0, 0x0, 0xff, 0x7}, 0x0, 0x7, r2, 0xa) [ 718.061728] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 718.078005] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 718.104239] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 718.126439] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 718.143495] device bridge_slave_1 left promiscuous mode [ 718.163956] bridge0: port 2(bridge_slave_1) entered disabled state [ 718.182490] device bridge_slave_0 left promiscuous mode [ 718.188700] bridge0: port 1(bridge_slave_0) entered disabled state [ 718.214469] device veth1_macvtap left promiscuous mode [ 718.234260] device veth0_macvtap left promiscuous mode [ 718.255015] device veth1_vlan left promiscuous mode [ 718.274716] device veth0_vlan left promiscuous mode [ 720.667936] Bluetooth: hci4: command 0x0409 tx timeout [ 722.747953] Bluetooth: hci4: command 0x041b tx timeout [ 724.032567] device hsr_slave_1 left promiscuous mode [ 724.043777] device hsr_slave_0 left promiscuous mode [ 724.058641] team0 (unregistering): Port device team_slave_1 removed [ 724.069750] team0 (unregistering): Port device team_slave_0 removed [ 724.079503] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 724.090977] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 724.125896] bond0 (unregistering): Released all slaves [ 724.144154] IPVS: ftp: loaded support on port[0] = 21 [ 724.260785] chnl_net:caif_netlink_parms(): no params data found [ 724.354864] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.363002] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.371738] device bridge_slave_0 entered promiscuous mode [ 724.380182] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.386631] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.394954] device bridge_slave_1 entered promiscuous mode [ 724.420687] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 724.430468] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 724.454024] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 724.463422] team0: Port device team_slave_0 added [ 724.470087] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 724.478404] team0: Port device team_slave_1 added [ 724.500748] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 724.507051] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 724.532990] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 724.545540] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 724.552260] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 724.578895] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 724.592041] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 724.600426] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 724.627394] device hsr_slave_0 entered promiscuous mode [ 724.634806] device hsr_slave_1 entered promiscuous mode [ 724.648871] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 724.656348] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 724.766249] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.772756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.779638] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.786035] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.827959] Bluetooth: hci4: command 0x040f tx timeout [ 724.847007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 724.857137] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 724.871669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 724.885170] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.893820] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.913534] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 724.920121] 8021q: adding VLAN 0 to HW filter on device team0 [ 724.931787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 724.940358] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.946740] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.969535] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 724.983930] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.990522] bridge0: port 2(bridge_slave_1) entered forwarding state [ 725.020973] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 725.044259] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 725.056461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 725.076344] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 725.102072] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 725.121571] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 725.133703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 725.145039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 725.182633] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 725.197762] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 725.216735] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 725.224775] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 725.245119] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 725.278943] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 725.290736] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 725.298764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 725.306870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 725.382070] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 725.389991] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 725.397064] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 725.408378] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 725.415214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 725.424190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 725.436083] device veth0_vlan entered promiscuous mode [ 725.443497] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 725.452309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 725.466281] device veth1_vlan entered promiscuous mode [ 725.476061] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 725.488825] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 725.506069] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 725.519352] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 725.526480] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 725.536065] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 725.545182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 725.560658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 725.573441] device veth0_macvtap entered promiscuous mode [ 725.580502] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 725.591575] device veth1_macvtap entered promiscuous mode [ 725.598023] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 725.606840] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 725.617326] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 725.626785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 725.636932] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 725.646207] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 725.656044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 725.665349] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 725.676088] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 725.687055] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 725.695006] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 725.702803] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 725.711304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 725.719301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 725.727194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 725.737238] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 725.747718] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 725.757644] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 725.767935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 725.778026] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 725.788665] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 725.799162] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 725.806067] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 725.814400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 725.822609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 725.962333] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 725.974132] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 726.003070] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 726.023263] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 726.033713] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 726.041621] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 726.050513] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 726.057559] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 728.594874] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 728.601723] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 728.612960] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 728.620306] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 728.628825] device bridge_slave_1 left promiscuous mode [ 728.634357] bridge0: port 2(bridge_slave_1) entered disabled state [ 728.643066] device bridge_slave_0 left promiscuous mode [ 728.648947] bridge0: port 1(bridge_slave_0) entered disabled state [ 728.660445] device veth1_macvtap left promiscuous mode [ 728.665794] device veth0_macvtap left promiscuous mode [ 728.671398] device veth1_vlan left promiscuous mode [ 728.676648] device veth0_vlan left promiscuous mode [ 731.548069] Bluetooth: hci4: command 0x0409 tx timeout [ 733.136029] device hsr_slave_1 left promiscuous mode [ 733.143622] device hsr_slave_0 left promiscuous mode [ 733.161766] team0 (unregistering): Port device team_slave_1 removed [ 733.171895] team0 (unregistering): Port device team_slave_0 removed [ 733.184392] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 733.196357] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 733.227363] bond0 (unregistering): Released all slaves [ 733.244874] IPVS: ftp: loaded support on port[0] = 21 [ 733.357019] chnl_net:caif_netlink_parms(): no params data found [ 733.457337] bridge0: port 1(bridge_slave_0) entered blocking state [ 733.464601] bridge0: port 1(bridge_slave_0) entered disabled state [ 733.473444] device bridge_slave_0 entered promiscuous mode [ 733.482065] bridge0: port 2(bridge_slave_1) entered blocking state [ 733.488891] bridge0: port 2(bridge_slave_1) entered disabled state [ 733.496470] device bridge_slave_1 entered promiscuous mode [ 733.522690] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 733.539036] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 733.572602] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 733.582170] team0: Port device team_slave_0 added [ 733.588690] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 733.596422] team0: Port device team_slave_1 added [ 733.618673] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 733.624965] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 733.634021] Bluetooth: hci4: command 0x041b tx timeout [ 733.651002] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 733.668501] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 733.674770] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 733.700880] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 733.713308] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 733.725095] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 733.764751] device hsr_slave_0 entered promiscuous mode [ 733.771772] device hsr_slave_1 entered promiscuous mode [ 733.782651] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 733.790606] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 733.894217] bridge0: port 2(bridge_slave_1) entered blocking state [ 733.900672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 733.907361] bridge0: port 1(bridge_slave_0) entered blocking state [ 733.913799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 733.963300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 733.974634] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 733.987045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 733.995711] bridge0: port 1(bridge_slave_0) entered disabled state [ 734.010598] bridge0: port 2(bridge_slave_1) entered disabled state [ 734.028548] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 734.034734] 8021q: adding VLAN 0 to HW filter on device team0 [ 734.047609] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 734.057380] bridge0: port 1(bridge_slave_0) entered blocking state [ 734.063832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 734.089157] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 734.097512] bridge0: port 2(bridge_slave_1) entered blocking state [ 734.103971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 734.120917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 734.150569] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 734.159401] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 734.167274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 734.176476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 734.186244] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 734.194382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 734.213852] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 734.222689] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 734.235118] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 734.253816] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 734.273718] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 734.285887] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 734.296268] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 734.309036] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 734.405437] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 734.414534] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 734.423771] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 734.434890] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 734.443202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 734.451763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 734.461571] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 734.470902] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 734.481843] device veth0_vlan entered promiscuous mode [ 734.502549] device veth1_vlan entered promiscuous mode [ 734.516137] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 734.535569] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 734.565879] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 734.591227] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 734.599276] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 734.606744] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 734.616505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 734.625270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 734.637007] device veth0_macvtap entered promiscuous mode [ 734.645513] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 734.656573] device veth1_macvtap entered promiscuous mode [ 734.664905] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 734.677307] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 734.690747] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 734.701634] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 734.712058] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.721356] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 734.731445] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.740750] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 734.751286] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.762202] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 734.769474] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 734.776272] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 734.784122] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 734.791755] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 734.801096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 734.815558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 734.832884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.845354] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 734.861809] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.873045] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 734.883099] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 734.893338] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 734.900513] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 734.908820] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 734.916804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 735.041455] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 735.058937] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 735.066066] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 735.100492] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 735.115551] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 735.122819] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 735.130970] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 735.139187] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 737.650439] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 737.657304] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 737.666311] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 737.673161] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 737.682214] device bridge_slave_1 left promiscuous mode [ 737.687702] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.695547] device bridge_slave_0 left promiscuous mode [ 737.701858] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.712588] device veth1_macvtap left promiscuous mode [ 737.718093] device veth0_macvtap left promiscuous mode [ 737.724319] device veth1_vlan left promiscuous mode [ 737.729768] device veth0_vlan left promiscuous mode [ 740.427966] Bluetooth: hci4: command 0x0409 tx timeout [ 742.147495] device hsr_slave_1 left promiscuous mode [ 742.155333] device hsr_slave_0 left promiscuous mode [ 742.169278] team0 (unregistering): Port device team_slave_1 removed [ 742.183847] team0 (unregistering): Port device team_slave_0 removed [ 742.193176] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 742.204305] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 742.235173] bond0 (unregistering): Released all slaves [ 742.253612] IPVS: ftp: loaded support on port[0] = 21 [ 742.360854] chnl_net:caif_netlink_parms(): no params data found [ 742.456914] bridge0: port 1(bridge_slave_0) entered blocking state [ 742.463737] bridge0: port 1(bridge_slave_0) entered disabled state [ 742.473360] device bridge_slave_0 entered promiscuous mode [ 742.483922] bridge0: port 2(bridge_slave_1) entered blocking state [ 742.491337] bridge0: port 2(bridge_slave_1) entered disabled state [ 742.500205] device bridge_slave_1 entered promiscuous mode [ 742.507928] Bluetooth: hci4: command 0x041b tx timeout [ 742.525437] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 742.536138] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 742.562406] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 742.571124] team0: Port device team_slave_0 added [ 742.577055] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 742.587351] team0: Port device team_slave_1 added [ 742.611679] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 742.618043] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 742.645221] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 742.660408] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 742.666688] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 742.704766] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 742.717015] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 742.731256] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 742.772375] device hsr_slave_0 entered promiscuous mode [ 742.781235] device hsr_slave_1 entered promiscuous mode [ 742.792836] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 742.802944] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 742.959759] bridge0: port 2(bridge_slave_1) entered blocking state [ 742.966195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 742.973013] bridge0: port 1(bridge_slave_0) entered blocking state [ 742.979447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 743.058256] 8021q: adding VLAN 0 to HW filter on device bond0 [ 743.075881] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 743.086533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 743.102409] bridge0: port 1(bridge_slave_0) entered disabled state [ 743.112615] bridge0: port 2(bridge_slave_1) entered disabled state [ 743.129977] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 743.136072] 8021q: adding VLAN 0 to HW filter on device team0 [ 743.151229] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 743.159635] bridge0: port 1(bridge_slave_0) entered blocking state [ 743.166213] bridge0: port 1(bridge_slave_0) entered forwarding state [ 743.183986] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 743.192143] bridge0: port 2(bridge_slave_1) entered blocking state [ 743.198616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 743.221094] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 743.230050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 743.254490] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 743.264908] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 743.276619] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 743.284827] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 743.292601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 743.302257] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 743.311636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 743.334286] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 743.343826] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 743.355174] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 743.365720] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 743.408613] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 743.433797] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 743.468694] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 743.476836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 743.492907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 743.564346] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 743.574025] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 743.583637] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 743.595558] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 743.603666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 743.612896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 743.624858] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 743.635934] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 743.653678] device veth0_vlan entered promiscuous mode [ 743.670988] device veth1_vlan entered promiscuous mode [ 743.677383] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 743.690142] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 743.705052] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 743.716072] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 743.723814] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 743.732022] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 743.739975] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 743.747913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 743.758665] device veth0_macvtap entered promiscuous mode [ 743.765182] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 743.775772] device veth1_macvtap entered promiscuous mode [ 743.783222] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 743.794589] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 743.805297] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 743.815993] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 743.826163] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 743.835564] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 743.845611] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 743.855231] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 743.865065] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 743.875902] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 743.883257] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 743.891153] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 743.898887] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 743.906427] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 743.914633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 743.925368] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 743.935728] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 743.945159] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 743.955048] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 743.964734] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 743.975002] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 743.985547] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 743.992654] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 744.000164] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 744.008880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 744.134799] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 744.155023] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 744.182324] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 744.204664] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 744.218048] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 744.218185] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 744.236979] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 744.244930] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 746.697266] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 746.704128] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 746.712895] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 746.719759] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 746.727643] device bridge_slave_1 left promiscuous mode [ 746.733309] bridge0: port 2(bridge_slave_1) entered disabled state [ 746.741791] device bridge_slave_0 left promiscuous mode [ 746.747313] bridge0: port 1(bridge_slave_0) entered disabled state [ 746.757435] device veth1_macvtap left promiscuous mode [ 746.763084] device veth0_macvtap left promiscuous mode [ 746.768563] device veth1_vlan left promiscuous mode [ 746.773614] device veth0_vlan left promiscuous mode [ 748.430536] ieee802154 phy0 wpan0: encryption failed: -22 [ 748.436332] ieee802154 phy1 wpan1: encryption failed: -22 [ 749.548030] Bluetooth: hci4: command 0x0409 tx timeout [ 751.257595] device hsr_slave_1 left promiscuous mode [ 751.265743] device hsr_slave_0 left promiscuous mode [ 751.282796] team0 (unregistering): Port device team_slave_1 removed [ 751.293863] team0 (unregistering): Port device team_slave_0 removed [ 751.305424] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 751.316854] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 751.347342] bond0 (unregistering): Released all slaves [ 751.365392] IPVS: ftp: loaded support on port[0] = 21 [ 751.469978] chnl_net:caif_netlink_parms(): no params data found [ 751.561134] bridge0: port 1(bridge_slave_0) entered blocking state [ 751.567634] bridge0: port 1(bridge_slave_0) entered disabled state [ 751.575926] device bridge_slave_0 entered promiscuous mode [ 751.584099] bridge0: port 2(bridge_slave_1) entered blocking state [ 751.591457] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.600107] device bridge_slave_1 entered promiscuous mode [ 751.628032] Bluetooth: hci4: command 0x041b tx timeout [ 751.635017] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 751.651685] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 751.683480] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 751.692063] team0: Port device team_slave_0 added [ 751.699333] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 751.707220] team0: Port device team_slave_1 added [ 751.729517] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 751.735789] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 751.761827] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 751.774504] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 751.781937] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 751.809014] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 751.820640] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 751.828963] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 751.856476] device hsr_slave_0 entered promiscuous mode [ 751.862980] device hsr_slave_1 entered promiscuous mode [ 751.870088] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 751.877541] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 752.026233] bridge0: port 2(bridge_slave_1) entered blocking state [ 752.032727] bridge0: port 2(bridge_slave_1) entered forwarding state [ 752.039546] bridge0: port 1(bridge_slave_0) entered blocking state [ 752.046117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 752.135631] 8021q: adding VLAN 0 to HW filter on device bond0 [ 752.152875] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 752.170918] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 752.185275] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.193996] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.215672] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 752.222158] 8021q: adding VLAN 0 to HW filter on device team0 [ 752.235967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 752.245746] bridge0: port 1(bridge_slave_0) entered blocking state [ 752.252229] bridge0: port 1(bridge_slave_0) entered forwarding state [ 752.280592] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 752.290490] bridge0: port 2(bridge_slave_1) entered blocking state [ 752.296890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 752.313457] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 752.324359] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 752.344398] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 752.362769] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 752.376353] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 752.389139] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 752.396382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 752.407044] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 752.416107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 752.434210] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 752.442549] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 752.451132] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 752.459020] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 752.472870] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 752.490643] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 752.502346] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 752.509971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 752.535366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 752.622386] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 752.636460] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 752.645141] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 752.663727] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 752.678520] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 752.692960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 752.702256] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 752.711008] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 752.721481] device veth0_vlan entered promiscuous mode [ 752.734824] device veth1_vlan entered promiscuous mode [ 752.741435] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 752.752974] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 752.769529] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 752.781799] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 752.789090] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 752.796516] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 752.806170] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 752.814649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 752.825582] device veth0_macvtap entered promiscuous mode [ 752.832708] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 752.843956] device veth1_macvtap entered promiscuous mode [ 752.850815] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 752.861558] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 752.873200] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 752.883095] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 752.893613] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 752.902826] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 752.913357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 752.924246] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 752.934739] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 752.945419] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 752.952615] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 752.959777] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 752.967258] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 752.975329] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 752.983596] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 752.994883] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 753.005531] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 753.014943] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 753.025171] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 753.034414] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 753.044668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 753.055044] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 753.062231] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 753.070148] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 753.080484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 753.204768] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 753.227326] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 753.244860] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 753.278486] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 753.289900] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 753.296416] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 753.304923] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 753.313276] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 755.823901] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 755.833185] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 755.846876] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 755.856388] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 755.868593] device bridge_slave_1 left promiscuous mode [ 755.875834] bridge0: port 2(bridge_slave_1) entered disabled state [ 755.884963] device bridge_slave_0 left promiscuous mode [ 755.892948] bridge0: port 1(bridge_slave_0) entered disabled state [ 755.903852] device veth1_macvtap left promiscuous mode [ 755.912564] device veth0_macvtap left promiscuous mode [ 755.918889] device veth1_vlan left promiscuous mode [ 755.925701] device veth0_vlan left promiscuous mode [ 758.598049] Bluetooth: hci4: command 0x0409 tx timeout [ 760.465888] device hsr_slave_1 left promiscuous mode [ 760.477119] device hsr_slave_0 left promiscuous mode [ 760.496019] team0 (unregistering): Port device team_slave_1 removed [ 760.507430] team0 (unregistering): Port device team_slave_0 removed [ 760.521566] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 760.534109] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 760.569515] bond0 (unregistering): Released all slaves [ 760.591248] IPVS: ftp: loaded support on port[0] = 21 [ 760.668244] Bluetooth: hci4: command 0x041b tx timeout [ 760.706558] chnl_net:caif_netlink_parms(): no params data found [ 760.787580] bridge0: port 1(bridge_slave_0) entered blocking state [ 760.795214] bridge0: port 1(bridge_slave_0) entered disabled state [ 760.806023] device bridge_slave_0 entered promiscuous mode [ 760.817057] bridge0: port 2(bridge_slave_1) entered blocking state [ 760.826515] bridge0: port 2(bridge_slave_1) entered disabled state [ 760.836169] device bridge_slave_1 entered promiscuous mode [ 760.861565] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 760.872961] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 760.899229] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 760.910133] team0: Port device team_slave_0 added [ 760.920150] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 760.930858] team0: Port device team_slave_1 added [ 760.954191] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 760.962659] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 760.991263] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 761.005552] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 761.013364] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 761.054859] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 761.105510] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 761.115283] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 761.143819] device hsr_slave_0 entered promiscuous mode [ 761.150611] device hsr_slave_1 entered promiscuous mode [ 761.158485] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 761.166727] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 761.345631] bridge0: port 2(bridge_slave_1) entered blocking state [ 761.352683] bridge0: port 2(bridge_slave_1) entered forwarding state [ 761.359821] bridge0: port 1(bridge_slave_0) entered blocking state [ 761.368141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 761.458585] 8021q: adding VLAN 0 to HW filter on device bond0 [ 761.470417] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 761.485038] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 761.494948] bridge0: port 1(bridge_slave_0) entered disabled state [ 761.510434] bridge0: port 2(bridge_slave_1) entered disabled state [ 761.531492] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 761.537633] 8021q: adding VLAN 0 to HW filter on device team0 [ 761.557596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 761.573825] bridge0: port 1(bridge_slave_0) entered blocking state [ 761.580288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 761.619653] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 761.637777] bridge0: port 2(bridge_slave_1) entered blocking state [ 761.644268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 761.676193] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 761.685595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 761.697200] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 761.706142] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 761.718064] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 761.725373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 761.737458] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 761.756447] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 761.767613] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 761.782285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 761.792364] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 761.801429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 761.810226] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 761.822827] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 761.831640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 761.851352] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 761.860722] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 761.868496] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 761.875438] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 761.890590] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 761.909254] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 761.921271] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 761.929434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 761.940990] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 762.015566] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 762.023806] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 762.033101] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 762.044573] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 762.053451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 762.064890] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 762.075808] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 762.085869] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 762.099707] device veth0_vlan entered promiscuous mode [ 762.116743] device veth1_vlan entered promiscuous mode [ 762.124106] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 762.137140] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 762.151685] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 762.162492] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 762.169580] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 762.176987] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 762.185251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 762.194577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 762.207243] device veth0_macvtap entered promiscuous mode [ 762.215004] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 762.226307] device veth1_macvtap entered promiscuous mode [ 762.233307] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 762.243631] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 762.256209] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 762.267678] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 762.279877] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 762.289270] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 762.299357] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 762.309029] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 762.319180] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 762.329808] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 762.336814] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 762.345378] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 762.354745] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 762.362701] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 762.370820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 762.381364] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 762.391799] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 762.401623] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 762.413880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 762.423551] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 762.433395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 762.443650] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 762.451624] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 762.460845] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 762.469456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 762.609102] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 762.622431] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 762.643041] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 762.684504] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 762.695050] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 762.702042] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 762.709661] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 762.716852] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 762.748536] Bluetooth: hci4: command 0x040f tx timeout [ 765.213025] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 765.221907] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 765.231264] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 765.238395] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 765.246115] device bridge_slave_1 left promiscuous mode [ 765.253106] bridge0: port 2(bridge_slave_1) entered disabled state [ 765.261413] device bridge_slave_0 left promiscuous mode [ 765.267058] bridge0: port 1(bridge_slave_0) entered disabled state [ 765.277158] device veth1_macvtap left promiscuous mode [ 765.282660] device veth0_macvtap left promiscuous mode [ 765.288130] device veth1_vlan left promiscuous mode [ 765.293188] device veth0_vlan left promiscuous mode [ 768.188489] Bluetooth: hci4: command 0x0409 tx timeout [ 769.881127] device hsr_slave_1 left promiscuous mode [ 769.894209] device hsr_slave_0 left promiscuous mode [ 769.907066] team0 (unregistering): Port device team_slave_1 removed [ 769.921539] team0 (unregistering): Port device team_slave_0 removed [ 769.931836] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 769.943189] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 769.975696] bond0 (unregistering): Released all slaves [ 769.995360] IPVS: ftp: loaded support on port[0] = 21 [ 770.104078] chnl_net:caif_netlink_parms(): no params data found [ 770.185115] bridge0: port 1(bridge_slave_0) entered blocking state [ 770.192422] bridge0: port 1(bridge_slave_0) entered disabled state [ 770.200526] device bridge_slave_0 entered promiscuous mode [ 770.208864] bridge0: port 2(bridge_slave_1) entered blocking state [ 770.215329] bridge0: port 2(bridge_slave_1) entered disabled state [ 770.223576] device bridge_slave_1 entered promiscuous mode [ 770.249294] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 770.260695] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 770.278699] Bluetooth: hci4: command 0x041b tx timeout [ 770.286474] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 770.296042] team0: Port device team_slave_0 added [ 770.302698] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 770.310803] team0: Port device team_slave_1 added [ 770.332966] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 770.340349] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 770.366616] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 770.379655] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 770.385916] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 770.411695] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 770.424444] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 770.432719] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 770.460938] device hsr_slave_0 entered promiscuous mode [ 770.467399] device hsr_slave_1 entered promiscuous mode [ 770.484129] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 770.491563] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 770.650955] bridge0: port 2(bridge_slave_1) entered blocking state [ 770.657364] bridge0: port 2(bridge_slave_1) entered forwarding state [ 770.664154] bridge0: port 1(bridge_slave_0) entered blocking state [ 770.670612] bridge0: port 1(bridge_slave_0) entered forwarding state [ 770.776863] 8021q: adding VLAN 0 to HW filter on device bond0 [ 770.787394] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 770.800406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 770.809532] bridge0: port 1(bridge_slave_0) entered disabled state [ 770.828745] bridge0: port 2(bridge_slave_1) entered disabled state [ 770.842690] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 770.849174] 8021q: adding VLAN 0 to HW filter on device team0 [ 770.866337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 770.876366] bridge0: port 1(bridge_slave_0) entered blocking state [ 770.882872] bridge0: port 1(bridge_slave_0) entered forwarding state [ 770.910794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 770.919316] bridge0: port 2(bridge_slave_1) entered blocking state [ 770.925689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 770.956834] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 770.966553] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 770.982572] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 771.002176] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 771.019953] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 771.026097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 771.039973] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 771.047609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 771.066856] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 771.076340] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 771.084378] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 771.093033] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 771.106640] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 771.125801] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 771.139469] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 771.148579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 771.156680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 771.263453] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 771.271826] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 771.280287] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 771.292191] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 771.299290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 771.307085] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 771.319235] device veth0_vlan entered promiscuous mode [ 771.334754] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 771.342501] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 771.357249] device veth1_vlan entered promiscuous mode [ 771.364535] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 771.376128] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 771.392581] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 771.404835] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 771.412587] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 771.421042] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 771.434707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 771.442880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 771.457402] device veth0_macvtap entered promiscuous mode [ 771.464536] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 771.473321] device veth1_macvtap entered promiscuous mode [ 771.481227] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 771.491362] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 771.501149] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 771.511324] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 771.521319] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.531465] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 771.541315] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.550560] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 771.560385] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.570882] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 771.578102] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 771.585624] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 771.593696] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 771.601226] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 771.609346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 771.619501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 771.630384] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.639691] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 771.649702] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.660216] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 771.670528] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 771.680978] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 771.688137] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 771.695641] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 771.704100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 771.840835] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 771.848718] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 771.866848] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 771.867118] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 771.888208] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 771.895349] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 771.909475] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 771.917236] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 774.383260] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 774.390767] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 774.399079] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 774.405862] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 774.414371] device bridge_slave_1 left promiscuous mode [ 774.421276] bridge0: port 2(bridge_slave_1) entered disabled state [ 774.429274] device bridge_slave_0 left promiscuous mode [ 774.435103] bridge0: port 1(bridge_slave_0) entered disabled state [ 774.446522] device veth1_macvtap left promiscuous mode [ 774.452181] device veth0_macvtap left promiscuous mode [ 774.457519] device veth1_vlan left promiscuous mode [ 774.462747] device veth0_vlan left promiscuous mode [ 777.228164] Bluetooth: hci4: command 0x0409 tx timeout [ 778.932553] device hsr_slave_1 left promiscuous mode [ 778.940777] device hsr_slave_0 left promiscuous mode [ 778.957544] team0 (unregistering): Port device team_slave_1 removed [ 778.971649] team0 (unregistering): Port device team_slave_0 removed [ 778.981341] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 778.992285] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 779.026591] bond0 (unregistering): Released all slaves [ 779.045569] IPVS: ftp: loaded support on port[0] = 21 [ 779.154557] chnl_net:caif_netlink_parms(): no params data found [ 779.241443] bridge0: port 1(bridge_slave_0) entered blocking state [ 779.248884] bridge0: port 1(bridge_slave_0) entered disabled state [ 779.256567] device bridge_slave_0 entered promiscuous mode [ 779.264870] bridge0: port 2(bridge_slave_1) entered blocking state [ 779.271737] bridge0: port 2(bridge_slave_1) entered disabled state [ 779.279769] device bridge_slave_1 entered promiscuous mode [ 779.304595] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 779.312317] Bluetooth: hci4: command 0x041b tx timeout [ 779.320573] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 779.344221] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 779.353269] team0: Port device team_slave_0 added [ 779.359730] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 779.367413] team0: Port device team_slave_1 added [ 779.389813] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 779.396115] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 779.422346] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 779.434871] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 779.441503] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 779.468312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 779.480024] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 779.487739] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 779.514140] device hsr_slave_0 entered promiscuous mode [ 779.520727] device hsr_slave_1 entered promiscuous mode [ 779.527113] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 779.535011] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 779.642468] bridge0: port 2(bridge_slave_1) entered blocking state [ 779.648930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 779.655636] bridge0: port 1(bridge_slave_0) entered blocking state [ 779.662102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 779.735121] 8021q: adding VLAN 0 to HW filter on device bond0 [ 779.745918] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 779.763753] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 779.775689] bridge0: port 1(bridge_slave_0) entered disabled state [ 779.785447] bridge0: port 2(bridge_slave_1) entered disabled state [ 779.806434] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 779.816589] 8021q: adding VLAN 0 to HW filter on device team0 [ 779.834523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 779.844856] bridge0: port 1(bridge_slave_0) entered blocking state [ 779.851298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 779.879199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 779.887026] bridge0: port 2(bridge_slave_1) entered blocking state [ 779.893484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 779.911360] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 779.920074] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 779.935225] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 779.946156] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 779.957785] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 779.970989] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 779.982620] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 779.993509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 780.015196] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 780.025256] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 780.045906] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 780.056567] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 780.073946] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 780.105070] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 780.126491] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 780.140684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 780.153291] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 780.232634] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 780.247214] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 780.264940] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 780.277164] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 780.292356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 780.304139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 780.321066] device veth0_vlan entered promiscuous mode [ 780.335647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 780.344926] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 780.365968] device veth1_vlan entered promiscuous mode [ 780.372755] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 780.385114] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 780.400942] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 780.413668] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 780.421331] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 780.430678] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 780.439568] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 780.447771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 780.461949] device veth0_macvtap entered promiscuous mode [ 780.471109] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 780.484851] device veth1_macvtap entered promiscuous mode [ 780.492323] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 780.503270] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 780.516250] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 780.525106] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 780.536069] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.546337] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 780.556796] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.566581] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 780.576880] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.587675] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 780.595244] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 780.603254] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 780.611270] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 780.619602] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 780.627509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 780.638379] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 780.648499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.657662] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 780.668118] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.677508] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 780.687336] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 780.697663] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 780.704990] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 780.712368] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 780.720919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 780.862947] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 780.869828] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 780.876952] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 780.917505] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 780.929269] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 780.935618] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 780.944021] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 780.951413] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 783.403479] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 783.410861] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 783.419027] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 783.425824] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 783.434539] device bridge_slave_1 left promiscuous mode [ 783.441217] bridge0: port 2(bridge_slave_1) entered disabled state [ 783.449180] device bridge_slave_0 left promiscuous mode [ 783.454614] bridge0: port 1(bridge_slave_0) entered disabled state [ 783.464714] device veth1_macvtap left promiscuous mode [ 783.470205] device veth0_macvtap left promiscuous mode [ 783.475535] device veth1_vlan left promiscuous mode [ 783.480793] device veth0_vlan left promiscuous mode [ 786.348071] Bluetooth: hci4: command 0x0409 tx timeout [ 787.895716] device hsr_slave_1 left promiscuous mode [ 787.905028] device hsr_slave_0 left promiscuous mode [ 787.923249] team0 (unregistering): Port device team_slave_1 removed [ 787.932715] team0 (unregistering): Port device team_slave_0 removed [ 787.945406] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 787.957005] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 787.988998] bond0 (unregistering): Released all slaves [ 788.008698] IPVS: ftp: loaded support on port[0] = 21 [ 788.109168] chnl_net:caif_netlink_parms(): no params data found [ 788.193961] bridge0: port 1(bridge_slave_0) entered blocking state [ 788.206427] bridge0: port 1(bridge_slave_0) entered disabled state [ 788.214730] device bridge_slave_0 entered promiscuous mode [ 788.228315] bridge0: port 2(bridge_slave_1) entered blocking state [ 788.234780] bridge0: port 2(bridge_slave_1) entered disabled state [ 788.248705] device bridge_slave_1 entered promiscuous mode [ 788.274411] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 788.286130] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 788.311179] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 788.324834] team0: Port device team_slave_0 added [ 788.331230] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 788.339503] team0: Port device team_slave_1 added [ 788.369970] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 788.376254] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 788.407070] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 788.425211] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 788.428150] Bluetooth: hci4: command 0x041b tx timeout [ 788.436542] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 788.469491] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 788.485594] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 788.494571] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 788.535665] device hsr_slave_0 entered promiscuous mode [ 788.546432] device hsr_slave_1 entered promiscuous mode [ 788.554150] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 788.567459] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 788.726897] bridge0: port 2(bridge_slave_1) entered blocking state [ 788.733345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 788.740075] bridge0: port 1(bridge_slave_0) entered blocking state [ 788.746478] bridge0: port 1(bridge_slave_0) entered forwarding state [ 788.825877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 788.842386] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 788.856033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 788.867808] bridge0: port 1(bridge_slave_0) entered disabled state [ 788.882523] bridge0: port 2(bridge_slave_1) entered disabled state [ 788.902034] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 788.912000] 8021q: adding VLAN 0 to HW filter on device team0 [ 788.928205] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 788.935956] bridge0: port 1(bridge_slave_0) entered blocking state [ 788.942359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 788.976116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 788.984123] bridge0: port 2(bridge_slave_1) entered blocking state [ 788.990585] bridge0: port 2(bridge_slave_1) entered forwarding state [ 789.006532] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 789.014486] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 789.030311] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 789.046751] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 789.054606] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 789.062557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 789.071101] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 789.082587] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 789.089856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 789.097674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 789.108826] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 789.117299] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 789.129138] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 789.135326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 789.143249] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 789.152128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 789.168736] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 789.178380] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 789.184665] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 789.192318] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 789.206038] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 789.224973] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 789.235838] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 789.243748] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 789.253917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 789.346783] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 789.360502] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 789.367551] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 789.385662] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 789.393344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 789.402707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 789.414592] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 789.422338] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 789.431392] device veth0_vlan entered promiscuous mode [ 789.443013] device veth1_vlan entered promiscuous mode [ 789.449689] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 789.460103] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 789.474909] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 789.484720] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 789.491790] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 789.499609] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 789.507007] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 789.515097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 789.524803] device veth0_macvtap entered promiscuous mode [ 789.532584] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 789.542191] device veth1_macvtap entered promiscuous mode [ 789.548766] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 789.558941] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 789.569189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 789.577811] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 789.588717] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 789.597992] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 789.607716] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 789.617298] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 789.627102] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 789.638113] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 789.645060] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 789.652794] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 789.660502] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 789.667651] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 789.675763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 789.685832] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 789.695914] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 789.705326] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 789.715672] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 789.725111] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 789.735464] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 789.746656] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 789.754110] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 789.761769] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 789.770470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 789.895895] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 789.904083] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 789.933787] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 789.938185] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 789.941125] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 789.962295] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 789.975006] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 789.983347] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 792.482947] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 792.490339] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 792.500057] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 792.506820] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 792.515758] device bridge_slave_1 left promiscuous mode [ 792.522259] bridge0: port 2(bridge_slave_1) entered disabled state [ 792.529994] device bridge_slave_0 left promiscuous mode [ 792.535462] bridge0: port 1(bridge_slave_0) entered disabled state [ 792.545914] device veth1_macvtap left promiscuous mode [ 792.551707] device veth0_macvtap left promiscuous mode [ 792.557047] device veth1_vlan left promiscuous mode [ 792.563027] device veth0_vlan left promiscuous mode [ 795.308030] Bluetooth: hci4: command 0x0409 tx timeout [ 796.990142] device hsr_slave_1 left promiscuous mode [ 797.002139] device hsr_slave_0 left promiscuous mode [ 797.015210] team0 (unregistering): Port device team_slave_1 removed [ 797.027754] team0 (unregistering): Port device team_slave_0 removed [ 797.037726] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 797.053123] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 797.087274] bond0 (unregistering): Released all slaves [ 797.105394] IPVS: ftp: loaded support on port[0] = 21 [ 797.206292] chnl_net:caif_netlink_parms(): no params data found [ 797.294183] bridge0: port 1(bridge_slave_0) entered blocking state [ 797.302077] bridge0: port 1(bridge_slave_0) entered disabled state [ 797.311271] device bridge_slave_0 entered promiscuous mode [ 797.320956] bridge0: port 2(bridge_slave_1) entered blocking state [ 797.327407] bridge0: port 2(bridge_slave_1) entered disabled state [ 797.336666] device bridge_slave_1 entered promiscuous mode [ 797.361716] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 797.373083] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 797.390989] Bluetooth: hci4: command 0x041b tx timeout [ 797.399665] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 797.407657] team0: Port device team_slave_0 added [ 797.416640] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 797.425483] team0: Port device team_slave_1 added [ 797.450717] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 797.456980] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 797.484528] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 797.498327] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 797.504601] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 797.531692] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 797.543827] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 797.552583] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 797.580077] device hsr_slave_0 entered promiscuous mode [ 797.586465] device hsr_slave_1 entered promiscuous mode [ 797.594646] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 797.603779] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 797.724215] bridge0: port 2(bridge_slave_1) entered blocking state [ 797.730696] bridge0: port 2(bridge_slave_1) entered forwarding state [ 797.737404] bridge0: port 1(bridge_slave_0) entered blocking state [ 797.743891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 797.813318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 797.826747] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 797.845806] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 797.857068] bridge0: port 1(bridge_slave_0) entered disabled state [ 797.873495] bridge0: port 2(bridge_slave_1) entered disabled state [ 797.889555] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 797.895672] 8021q: adding VLAN 0 to HW filter on device team0 [ 797.914869] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 797.929549] bridge0: port 1(bridge_slave_0) entered blocking state [ 797.935960] bridge0: port 1(bridge_slave_0) entered forwarding state [ 797.976250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 797.985778] bridge0: port 2(bridge_slave_1) entered blocking state [ 797.992446] bridge0: port 2(bridge_slave_1) entered forwarding state [ 798.008694] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 798.016978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 798.045239] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 798.062923] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 798.074988] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 798.091201] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 798.104103] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 798.115037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 798.143602] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 798.151485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 798.165398] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 798.173746] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 798.185987] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 798.209891] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 798.233042] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 798.250643] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 798.257751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 798.285580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 798.356709] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 798.365956] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 798.376151] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 798.390841] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 798.397742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 798.411902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 798.424020] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 798.434830] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 798.445178] device veth0_vlan entered promiscuous mode [ 798.463565] device veth1_vlan entered promiscuous mode [ 798.470698] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 798.483866] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 798.500520] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 798.503917] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 798.515720] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 798.524743] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 798.535953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 798.545790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 798.557772] device veth0_macvtap entered promiscuous mode [ 798.564875] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 798.574430] device veth1_macvtap entered promiscuous mode [ 798.581926] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 798.592035] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 798.603683] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 798.613355] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 798.623222] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 798.632798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 798.642609] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 798.651825] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 798.661669] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 798.672281] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 798.679630] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 798.687150] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 798.695343] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 798.703273] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 798.711712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 798.722602] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 798.733345] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 798.743653] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 798.754202] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 798.764067] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 798.774414] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 798.784696] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 798.793195] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 798.800435] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 798.808923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 798.948843] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 798.957042] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 798.974701] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 799.011618] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 799.024118] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 799.036389] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 799.046377] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 799.054540] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 801.553565] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 801.560913] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 801.569996] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 801.576728] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 801.584957] device bridge_slave_1 left promiscuous mode [ 801.591324] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.599217] device bridge_slave_0 left promiscuous mode [ 801.604688] bridge0: port 1(bridge_slave_0) entered disabled state [ 801.614235] device veth1_macvtap left promiscuous mode [ 801.619707] device veth0_macvtap left promiscuous mode [ 801.625027] device veth1_vlan left promiscuous mode [ 801.630303] device veth0_vlan left promiscuous mode [ 804.348078] Bluetooth: hci4: command 0x0409 tx timeout [ 806.062896] device hsr_slave_1 left promiscuous mode [ 806.071520] device hsr_slave_0 left promiscuous mode [ 806.091058] team0 (unregistering): Port device team_slave_1 removed [ 806.103822] team0 (unregistering): Port device team_slave_0 removed [ 806.115533] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 806.127135] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 806.163402] bond0 (unregistering): Released all slaves [ 806.183503] IPVS: ftp: loaded support on port[0] = 21 [ 806.310122] chnl_net:caif_netlink_parms(): no params data found [ 806.414129] bridge0: port 1(bridge_slave_0) entered blocking state [ 806.428819] Bluetooth: hci4: command 0x041b tx timeout [ 806.443811] bridge0: port 1(bridge_slave_0) entered disabled state [ 806.455229] device bridge_slave_0 entered promiscuous mode [ 806.471088] bridge0: port 2(bridge_slave_1) entered blocking state [ 806.482019] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.494443] device bridge_slave_1 entered promiscuous mode [ 806.535586] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 806.553427] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 806.589837] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 806.600745] team0: Port device team_slave_0 added [ 806.607170] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 806.618358] team0: Port device team_slave_1 added [ 806.642769] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 806.650143] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 806.682352] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 806.700285] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 806.707348] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 806.736710] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 806.750814] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 806.763026] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 806.794056] device hsr_slave_0 entered promiscuous mode [ 806.801391] device hsr_slave_1 entered promiscuous mode [ 806.811472] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 806.820047] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 806.932652] bridge0: port 2(bridge_slave_1) entered blocking state [ 806.940300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 806.948426] bridge0: port 1(bridge_slave_0) entered blocking state [ 806.955328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 807.013300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 807.025626] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 807.046682] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 807.062633] bridge0: port 1(bridge_slave_0) entered disabled state [ 807.076408] bridge0: port 2(bridge_slave_1) entered disabled state [ 807.096240] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 807.105186] 8021q: adding VLAN 0 to HW filter on device team0 [ 807.121980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 807.131087] bridge0: port 1(bridge_slave_0) entered blocking state [ 807.139462] bridge0: port 1(bridge_slave_0) entered forwarding state [ 807.166136] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 807.177195] bridge0: port 2(bridge_slave_1) entered blocking state [ 807.184353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 807.209656] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 807.221992] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 807.232045] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 807.242029] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 807.252307] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 807.266230] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 807.276547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 807.298648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 807.312638] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 807.332774] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 807.352927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 807.367321] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 807.375994] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 807.400042] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 807.411751] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 807.421259] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 807.429949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 807.444205] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 807.463077] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 807.479941] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 807.488531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 807.499842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 807.567043] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 807.578898] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 807.586015] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 807.605305] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 807.617714] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 807.635061] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 807.646144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 807.660449] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 807.671812] device veth0_vlan entered promiscuous mode [ 807.685568] device veth1_vlan entered promiscuous mode [ 807.693496] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 807.703867] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 807.726032] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 807.740125] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 807.747745] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 807.756287] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 807.764731] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 807.774431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 807.785089] device veth0_macvtap entered promiscuous mode [ 807.792826] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 807.802750] device veth1_macvtap entered promiscuous mode [ 807.811348] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 807.823426] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 807.836208] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 807.846046] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 807.858258] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 807.869212] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 807.879663] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 807.889705] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 807.900930] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 807.914485] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 807.923667] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 807.932025] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 807.940745] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 807.949559] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 807.958827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 807.973304] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 807.985317] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 807.998423] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 808.010847] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 808.024350] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 808.037371] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 808.049545] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 808.059949] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 808.068237] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 808.077457] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 808.230602] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 808.239870] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 808.258596] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 808.270094] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 808.292689] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 808.306394] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 808.314766] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 808.323500] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 809.870672] ieee802154 phy0 wpan0: encryption failed: -22 [ 809.876749] ieee802154 phy1 wpan1: encryption failed: -22 [ 810.883132] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 810.891836] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 810.901768] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 810.910358] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 810.921258] device bridge_slave_1 left promiscuous mode [ 810.927414] bridge0: port 2(bridge_slave_1) entered disabled state [ 810.936472] device bridge_slave_0 left promiscuous mode [ 810.942180] bridge0: port 1(bridge_slave_0) entered disabled state [ 810.952142] device veth1_macvtap left promiscuous mode [ 810.958328] device veth0_macvtap left promiscuous mode [ 810.964040] device veth1_vlan left promiscuous mode [ 810.969847] device veth0_vlan left promiscuous mode [ 813.708157] Bluetooth: hci4: command 0x0409 tx timeout [ 815.451869] device hsr_slave_1 left promiscuous mode [ 815.462341] device hsr_slave_0 left promiscuous mode [ 815.481845] team0 (unregistering): Port device team_slave_1 removed [ 815.492723] team0 (unregistering): Port device team_slave_0 removed [ 815.505854] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 815.517451] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 815.553253] bond0 (unregistering): Released all slaves [ 815.572743] IPVS: ftp: loaded support on port[0] = 21 [ 815.735229] chnl_net:caif_netlink_parms(): no params data found [ 815.789734] Bluetooth: hci4: command 0x041b tx timeout [ 815.846680] bridge0: port 1(bridge_slave_0) entered blocking state [ 815.856500] bridge0: port 1(bridge_slave_0) entered disabled state [ 815.872431] device bridge_slave_0 entered promiscuous mode [ 815.885023] bridge0: port 2(bridge_slave_1) entered blocking state [ 815.894658] bridge0: port 2(bridge_slave_1) entered disabled state [ 815.911750] device bridge_slave_1 entered promiscuous mode [ 815.952134] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 815.966474] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 816.005446] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 816.016827] team0: Port device team_slave_0 added [ 816.027830] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 816.043289] team0: Port device team_slave_1 added [ 816.075595] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 816.086371] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 816.120578] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 816.140510] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 816.147098] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 816.180877] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 816.197079] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 816.212575] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 816.252597] device hsr_slave_0 entered promiscuous mode [ 816.261498] device hsr_slave_1 entered promiscuous mode [ 816.273782] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 816.283425] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 816.442710] bridge0: port 2(bridge_slave_1) entered blocking state [ 816.449166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 816.455855] bridge0: port 1(bridge_slave_0) entered blocking state [ 816.462351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 816.513188] 8021q: adding VLAN 0 to HW filter on device bond0 [ 816.524179] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 816.535414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 816.544469] bridge0: port 1(bridge_slave_0) entered disabled state [ 816.551762] bridge0: port 2(bridge_slave_1) entered disabled state [ 816.563827] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 816.570633] 8021q: adding VLAN 0 to HW filter on device team0 [ 816.580680] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 816.587734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 816.596583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 816.604925] bridge0: port 1(bridge_slave_0) entered blocking state [ 816.611439] bridge0: port 1(bridge_slave_0) entered forwarding state [ 816.622394] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 816.630834] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 816.640634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 816.654184] bridge0: port 2(bridge_slave_1) entered blocking state [ 816.660642] bridge0: port 2(bridge_slave_1) entered forwarding state [ 816.685701] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 816.693539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 816.708703] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 816.721055] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 816.728252] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 816.736969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 816.755234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 816.774642] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 816.782483] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 816.790246] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 816.798719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 816.810205] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 816.817582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 816.828548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 816.841820] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 816.849410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 816.857208] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 816.867662] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 816.874323] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 816.891983] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 816.900378] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 816.906721] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 816.915591] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 816.929140] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 816.944276] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 816.954154] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 816.962091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 816.972626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 817.004493] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 817.012952] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 817.020859] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 817.031914] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 817.038716] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 817.046346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 817.055872] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 817.066050] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 817.074795] device veth0_vlan entered promiscuous mode [ 817.086087] device veth1_vlan entered promiscuous mode [ 817.092484] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 817.103996] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 817.116251] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 817.126280] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 817.134070] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 817.142466] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 817.149964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 817.157738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 817.168477] device veth0_macvtap entered promiscuous mode [ 817.174836] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 817.184262] device veth1_macvtap entered promiscuous mode [ 817.191544] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 817.202045] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 817.211860] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 817.221334] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 817.232008] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.241939] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 817.251780] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.261217] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 817.271768] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.282271] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 817.289688] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 817.296691] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 817.304515] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 817.311971] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 817.321827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 817.333070] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 817.343121] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.353377] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 817.363281] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.372470] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 817.382975] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 817.393266] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 817.400381] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 817.407354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 817.415579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 817.535568] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 817.551898] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 817.575398] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 817.591348] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 817.610639] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 817.617082] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 817.632549] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 817.641491] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 2021/03/02 23:29:48 executor 4 failed 11 times: executor 4: exit status 67 running=-1 collide=0 completed=2 flag_threaded=1 flag_collide=1 current=0 th # 0: created=1 executing=0 colliding=0 ready=0 done=1 call_index=1 res=0 reserrno=14 th # 1: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 2: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 3: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 4: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 5: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 6: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 7: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 8: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th # 9: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #10: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #11: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #12: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #13: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #14: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 th #15: created=0 executing=0 colliding=0 ready=0 done=0 call_index=0 res=0 reserrno=0 SYZFAIL: negative running (errno 11: Resource temporarily unavailable) SYZFAIL: child failed (errno 0: Success) loop exited with status 67