ir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\r', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 644.570593] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 644.598689] device nr0 entered promiscuous mode 09:27:26 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000580)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r3, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x3000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2h', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:26 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1b6, 0xd, &(0x7f0000000080)=""/254) 09:27:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x6c000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:26 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x55010000, 0xd, &(0x7f0000000080)=""/254) 09:27:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x500000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2L', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 645.686311] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x5, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = syz_open_dev$admmidi(&(0x7f0000000540)='/dev/admmidi#\x00', 0x1, 0x10ac0) connect$l2tp(r3, &(0x7f0000000580)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @loopback}, 0x4, 0x2, 0x1, 0x1}}, 0x26) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) ioctl$FS_IOC_FIEMAP(r7, 0xc020660b, &(0x7f0000001b40)={0x4c, 0x10000000000, 0x7, 0x4, 0x3, [{0x0, 0x8, 0x4, 0x0, 0x0, 0x80}, {0x8, 0x3, 0x0, 0x0, 0x0, 0x3001}, {0xfffffffffffffffa, 0x800, 0x7, 0x0, 0x0, 0x1002}]}) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080, 0xfffffffffffffffd}, 0x2c) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x3, 0x112b8c3f, 0x0, 0x2, 0xe, 0x4, "4d19b32be07001121c65d990d565c84ddf16d1cec46ac630a755c6161de3e4064e84b642d84c434396a8c1216cdfee458a46fc06eb6c8eaf5993c465b4459022", "b823440c81b6cba938160b31a895683e5e86a79bb47048c1fa67b270d4aea2cc5080dd6933092eef56ffcf7d7eb765f6011d657f56af6283d13f4ec6a4992083", "9a5a718dcdc6ed5b2e9e63b6df6cf05a12d7488e5373ec3737f660e615f8114e", [0x7, 0x2]}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r8, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r3, &(0x7f0000001800)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2018}, 0xc, &(0x7f0000000680)={&(0x7f0000001ac0)={0x48, r9, 0x302, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x48}}, 0x40000) 09:27:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432fc", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:26 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xc2010000, 0xd, &(0x7f0000000080)=""/254) 09:27:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x9effffff}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:27 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1100, 0xd, &(0x7f0000000080)=""/254) 09:27:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432fd", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x48000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:27 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xff00, 0xd, &(0x7f0000000080)=""/254) 09:27:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000540)="199f2b8b8be4ea29dbcdf5de2b26a542fff789084c88d1511e15824561514f9ea8d62294be8d593307ce9c1fe97e9a2e61ab7e7acfa2cc5e10d52d6c15c1f2292f91ffa8e7", 0xfffffffffffffffe}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xfcffffff}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:27 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3a00, 0xd, &(0x7f0000000080)=""/254) 09:27:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x4c000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x6}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:27 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xb401000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x7a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:27 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xbb000000, 0xd, &(0x7f0000000080)=""/254) [ 646.910038] device nr0 entered promiscuous mode 09:27:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) fcntl$addseals(r1, 0x409, 0x4) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x4c00000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:28 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xce000000, 0xd, &(0x7f0000000080)=""/254) 09:27:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 647.864058] EXT4-fs: 49 callbacks suppressed [ 647.864070] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 647.867637] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 647.886394] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:28 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x8400, 0xd, &(0x7f0000000080)=""/254) [ 647.907473] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xf00000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 647.938217] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:28 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7901, 0xd, &(0x7f0000000080)=""/254) [ 647.988851] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 648.010328] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 648.019810] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x9effffff00000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 648.072298] device nr0 entered promiscuous mode [ 648.218323] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 648.267230] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 648.333155] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 648.401453] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 648.423335] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) syz_open_dev$dspn(&(0x7f0000000540)='/dev/dsp#\x00', 0x824, 0x20401) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:29 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xb700000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x5f0b000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:29 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xa200000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2P', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 649.153144] device nr0 entered promiscuous mode 09:27:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 649.183813] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x2000000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 649.426867] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000000540)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xf0ffffff00000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:30 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xe700, 0xd, &(0x7f0000000080)=""/254) 09:27:30 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6100, 0xd, &(0x7f0000000080)=""/254) [ 650.144485] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2l', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xf000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743206", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xb5f}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 650.981338] device nr0 entered promiscuous mode 09:27:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000001a40)='/dev/vcs#\x00', 0x7, 0x800) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000001a80)=""/173) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000540)={'team0\x00', 0x0}) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000580)={r7, 0xffffffffffff7fff, 0x0, 0x100000000, 0x9, 0xfff, 0x3}) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001e80)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r8, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r3, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) r9 = add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f0000001800)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000600)='user\x00', &(0x7f0000000640)={'syz', 0x2}, &(0x7f00000019c0)="26f515f0c93c4df1080c3c7324cb1608cc40418ada817333ee191f43484822ead4f266cbfc214041757f39ae863df547debaec01eaf583be719252b2a29ab06d25e8cb942ef8ef64215a211a9bf53d3f5d", 0x51, r9) 09:27:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x4800000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2L', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:31 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xf401000000000000, 0xd, &(0x7f0000000080)=""/254) [ 651.322797] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:31 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xab01000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x3f000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2l', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 651.491459] device nr0 entered promiscuous mode 09:27:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x4800}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000019c0)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@remote}}, &(0x7f0000000580)=0xe8) getgroups(0x6, &(0x7f0000000600)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) lchown(&(0x7f0000000540)='./file0\x00', r4, r5) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000640)=0x2a, 0x4) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r8, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r7) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x4c00}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:33 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xb401, 0xd, &(0x7f0000000080)=""/254) 09:27:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x6000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:33 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x8a01000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 652.698932] device nr0 entered promiscuous mode 09:27:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xf}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 652.889597] EXT4-fs: 43 callbacks suppressed [ 652.889608] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 652.916641] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x6c00000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2`', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2z', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xa00000000000000, 0xd, &(0x7f0000000080)=""/254) [ 653.618283] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 653.633193] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 653.636265] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 653.655288] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2400000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x400000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 653.702113] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 653.723969] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2-', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="657874327f", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xa4010000, 0xd, &(0x7f0000000080)=""/254) [ 653.803174] device nr0 entered promiscuous mode 09:27:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 653.868865] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 653.957031] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 654.017057] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 654.065926] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x3, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4000000000000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000540)={0xfffffffffffffc01}) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000019c0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507401900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d77c93943dc625deafd61219b4df0f1227f36af2dce7d92a565d51cf21a74503453b5aabd6ed50d4b228e47f466b18fdd5ee7b179064acc09f10fc545dfb386eb69a385e730606ed48746580f53aed20391a46c1f22f857611d584cfdbc9e0a43d31cacc77103a7f9ca0a4e4f5808a629fe3663a54f3ea7b9907aad6558e7117c82d00a22e4dbe277d171c000ac103191072dc5da12918e372d6a9eaf989543162663c473ed2b00bac6"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x7a000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:35 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x78, 0xd, &(0x7f0000000080)=""/254) 09:27:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743206", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x600}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:35 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1c00000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2z', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x600000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 654.943609] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 654.983990] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 655.557601] device nr0 entered promiscuous mode 09:27:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/mixer\x00', 0x40, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) write$eventfd(r3, &(0x7f0000000540)=0x7, 0x8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280), 0x4}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x6800000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5401000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 655.891352] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xa0010000, 0xd, &(0x7f0000000080)=""/254) 09:27:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x7000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 656.058692] device nr0 entered promiscuous mode 09:27:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) poll(&(0x7f0000000540)=[{r1, 0x40}, {r0}, {r1, 0xc2}, {r2, 0x14}, {r2, 0x4}], 0x5, 0x100000000) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x7400}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:37 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x104, 0xd, &(0x7f0000000080)=""/254) 09:27:37 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x15010000, 0xd, &(0x7f0000000080)=""/254) 09:27:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xf0ffffff}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x60}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432fd", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 657.327606] device nr0 entered promiscuous mode 09:27:38 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000680), &(0x7f0000001800)=0x30) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000540)={0x0, 0xffffffff80000000}, &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000600)={r5, 0x8000, 0x10}, &(0x7f0000000640)=0xc) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$KVM_SET_TSS_ADDR(r4, 0xae47, 0xd000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r8, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r3, 0x40049409, r7) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r6, 0x6, 0x23, &(0x7f00000019c0)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000001a00)=0x10) 09:27:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x300}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743297", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2h', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xea00, 0xd, &(0x7f0000000080)=""/254) 09:27:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xffffff9e}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 658.291595] EXT4-fs: 36 callbacks suppressed [ 658.291606] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 658.323250] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:39 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4f00000000000000, 0xd, &(0x7f0000000080)=""/254) [ 658.368526] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 658.405393] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 658.420807] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x7400000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 658.473655] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 658.518573] device nr0 entered promiscuous mode 09:27:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432fc", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 658.578386] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 658.578394] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 658.578870] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 658.629552] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 658.655299] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 658.671441] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) ioctl$NBD_DO_IT(r4, 0xab03) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2`', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:40 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7401, 0xd, &(0x7f0000000080)=""/254) 09:27:40 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xb01, 0xd, &(0x7f0000000080)=""/254) 09:27:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xffffff7f00000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 659.666788] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xfffff000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 659.725484] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 659.747620] device nr0 entered promiscuous mode 09:27:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:41 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3101, 0xd, &(0x7f0000000080)=""/254) 09:27:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x30000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:41 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x17, 0xd, &(0x7f0000000080)=""/254) 09:27:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xf0}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:41 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1800000000000000, 0xd, &(0x7f0000000080)=""/254) [ 660.951601] device nr0 entered promiscuous mode 09:27:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21, 0x2001}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xe601000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xae010000, 0xd, &(0x7f0000000080)=""/254) 09:27:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x700000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 661.878664] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 661.929864] device nr0 entered promiscuous mode [ 661.942117] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xb01000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:43 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/vga_arbiter\x00', 0xa000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001b40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000001b00)='{mime_type\x00'}, 0x30) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000001b80)=r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x308) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r5, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r8, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r4, 0x40049409, r7) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x3f00}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xa001000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x4c}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3c010000, 0xd, &(0x7f0000000080)=""/254) 09:27:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x3000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="657874328c", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 663.115141] device nr0 entered promiscuous mode [ 663.176052] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000540)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x68000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5d010000, 0xd, &(0x7f0000000080)=""/254) 09:27:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x5000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 663.994776] EXT4-fs: 45 callbacks suppressed [ 663.994787] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x12a, 0xd, &(0x7f0000000080)=""/254) [ 664.040565] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 664.062095] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xf000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 664.089628] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 664.129966] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x5}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 664.173214] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 664.617019] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 664.656234] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 664.669387] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 664.716579] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) vmsplice(r0, &(0x7f0000000540)=[{&(0x7f0000000600)="018c98860e6b919b2cb895ca585316d4dd804aeb6bb2c72451c49c54630e9aa3f83e567de9e1250eebab9c70b363759ef3ea9252b9c8d7b18275bfd9e085aceb1a25f3e7b03b57c671f9870bdcf50033070112a73c62563f504b11c08782e32dd99c09b481593a81db4ddf0b08984355ee36f81a1c55fa0a0af6b481840dee4f4bb3a89989dfb78f63266c47978d1c4f589e036206", 0x95}], 0x1, 0x4) r3 = syz_open_dev$sndpcmp(&(0x7f0000001a80)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x20102) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000001a40)={0x0, 0x80000, 0xffffffffffffff9c}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/zero\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000001a00)={r4, 0x80000, r5}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r6, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r6, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r6, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001f80)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r9, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x34, 0xd, &(0x7f0000000080)=""/254) 09:27:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x24, 0xd, &(0x7f0000000080)=""/254) 09:27:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xfcffffff00000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x9601000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 665.184116] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 665.859145] device nr0 entered promiscuous mode 09:27:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000540)='/dev/rfkill\x00', 0x80000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000019c0)) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001, 0x5}, 0x138) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r3, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x7a00000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xc201, 0xd, &(0x7f0000000080)=""/254) 09:27:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 666.118148] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2601, 0xd, &(0x7f0000000080)=""/254) 09:27:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x5f0b0000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 666.323495] device nr0 entered promiscuous mode 09:27:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000540)=ANY=[@ANYBLOB="01000500aaaaaaaabbaaaaaaaaaabb822c1dbcd3010180c200aaaaaa08aa0b0000"]) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) shutdown(r4, 0x0) bind$inet(r3, &(0x7f0000000580)={0x2, 0x4e21, @broadcast}, 0x10) recvmmsg(r4, &(0x7f0000001840), 0x141ee7a00000355, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xfffffff0}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743202", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x9600, 0xd, &(0x7f0000000080)=""/254) 09:27:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xfffffffc}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xa500, 0xd, &(0x7f0000000080)=""/254) 09:27:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x6000000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 667.440407] device nr0 entered promiscuous mode [ 667.494610] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 667.555983] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\a', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x200000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:48 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xd6, 0xd, &(0x7f0000000080)=""/254) [ 668.399935] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x19000000, 0xd, &(0x7f0000000080)=""/254) 09:27:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x700}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2H', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x6c00}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 668.553657] device nr0 entered promiscuous mode 09:27:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) ioctl$EVIOCGEFFECTS(r4, 0x80044584, &(0x7f00000019c0)=""/189) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000640)=ANY=[@ANYBLOB="0300dfdfc71f501dc15321dc7b40f0ba9f7c7e1daafa9e7e171cbc9a15a544b7567941081c6f", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000580)=0x10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000600)={r7, 0x3f, 0x8, 0xfffffffffffffff9, 0xffffffff, 0x20}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x5f0b}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432fd", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743205", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xdf01, 0xd, &(0x7f0000000080)=""/254) 09:27:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x74000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 669.464863] EXT4-fs: 46 callbacks suppressed [ 669.464873] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 669.503586] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xea, 0xd, &(0x7f0000000080)=""/254) 09:27:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x400300}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 669.530562] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 669.556399] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x172, 0xd, &(0x7f0000000080)=""/254) [ 669.631818] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 669.641592] device nr0 entered promiscuous mode 09:27:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x6000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 669.677470] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 669.891357] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 669.939842] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2H', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:51 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x8800000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x60000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000002240)="2dfcf2000000000000000060a75af209e2b03abb7445c0b9f5e9583db0cb52cd43ebbdc483220bb2a8f7bdbdba2b72bfb4eacbbf48465cce854be11a2a2adb5f855a54611e99e1faa16e1f2307a9fcfed3094560285564ab5eb79f6e0cd5d937612b5f460d0e2cb96d98dde7f792048341cfbc3af8155fb706e4dde8a540c2233ecb1740021e6f5b5952d2f150a457f6db13f555f2f21e313166716e8e13c90aaac41f723869bfd8") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"2840753e030e7164ffffff00", 0x4001}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x0, 0x0, 0x80000000, 0x0, 0x0, r4}, 0xfffffffffffffdc3) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) r7 = msgget(0x3, 0x200) msgctl$IPC_STAT(r7, 0x2, &(0x7f0000002040)=""/193) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x0, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) bind$bt_rfcomm(r3, &(0x7f00000003c0)={0x1f, {0xa5, 0xd8d, 0x83e, 0x400, 0xffffffffffffd162, 0xfffffffffffffffa}, 0x79dc9922}, 0xa) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000001c40)={"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"}) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000440)={0x3, 0xc, 0x101, 0x8000, 0x9, 0x30cf792e, 0x4c4b, 0x1f, 0x8, 0x1, 0xffffffff, 0x1}) 09:27:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 670.607034] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x7a00}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:51 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xaf00, 0xd, &(0x7f0000000080)=""/254) [ 670.661517] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0xffffff7f}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432fd", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x500}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x7}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2P', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743204", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r5, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, 0xffffffffffffffff) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x74}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743203", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x113, 0xd, &(0x7f0000000080)=""/254) 09:27:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x48}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xb8000000, 0xd, &(0x7f0000000080)=""/254) 09:27:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x100000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 671.754656] device nr0 entered promiscuous mode [ 671.783677] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = openat(r0, &(0x7f0000000580)='./file0\x00', 0x20000, 0x81) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000600)=0x10, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/mixer\x00', 0x8042, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r3, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x3f00000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x29010000, 0xd, &(0x7f0000000080)=""/254) 09:27:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 672.797553] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x9600000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="657874327f", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 672.856939] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 672.960522] device nr0 entered promiscuous mode [ 673.018595] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 673.135056] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 673.182122] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/dev/qat_adf_ctl\x00', 0x80200, 0x0) write$P9_RWALK(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="712000006f01000800000400000002000000000000000902000000ff0100000000000040000000000200512793c05bfc588597c639c24d00000800000020030000000300000000000000200200000002000000000000000801303338372300000004000000000000000000020000000000"], 0x71) close(r0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000540)=0x10) getpeername$netlink(r4, &(0x7f0000000240), &(0x7f0000000580)=0xc) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001800), 0xec, 0x0, &(0x7f00000019c0)="85744edcc889c1f3ebc709320dbdce594f1d945d8bd6be17b219e28b2b67d501384550ed8b86781d07d1cf8c3a75e25fdaeb07e4a6c91a9342f9ce84cceda0d32762cc07ae25cdae6952e95a3f35aba8f18a71836249c8f908c8ecbb7c74db98d385a0c37951dfeadbcbc6e7bd182da60c90cf4da5b3c05c5559f5420e3f79fe71d9c8cb8f0d2df8065273572694857ad4b25ec42b3039967fcb6c2954dc0c22ed6f6ea2c3b6c65cdc3ea6fb4a31a946f86fb96bfd8e2682f1cffca8f72a2fbc1f21e5be419d423c3b9f3889c8907e2ef90c613d3cbc097b0cc0e506c5255aefd476646000dd9f9f3d5ea8b6"}) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r3, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2z', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\r', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x60000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xc000000, 0xd, &(0x7f0000000080)=""/254) [ 673.950966] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x500}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xa300, 0xd, &(0x7f0000000080)=""/254) 09:27:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\a', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 674.082161] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 674.098520] QAT: Invalid ioctl [ 674.111654] device nr0 entered promiscuous mode 09:27:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x6c00000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 674.274865] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 674.794020] QAT: Invalid ioctl 09:27:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) ioctl$UI_END_FF_UPLOAD(r4, 0x406855c9, &(0x7f0000000540)={0xb, 0x7fff, {0x53, 0x3f, 0x3, {0x9, 0x1}, {0x0, 0x5}, @const={0x5, {0xa9, 0x9, 0x1, 0x1}}}, {0x52, 0x49, 0x1, {0x80, 0xffff}, {0x7ff, 0x3}, @cond=[{0x80000001, 0x0, 0x97db, 0xffff, 0xa4, 0x7}, {0xca, 0xfffffffffffffff8, 0x1000, 0x7, 0x0, 0x3f}]}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2L', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xb000, 0xd, &(0x7f0000000080)=""/254) 09:27:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743297", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x200000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x100000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 675.169350] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 675.179512] EXT4-fs: 47 callbacks suppressed [ 675.179524] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 675.206925] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6e, 0xd, &(0x7f0000000080)=""/254) [ 675.250954] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 675.283205] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2h', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xf0ffffff00000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 675.339270] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x181, 0xd, &(0x7f0000000080)=""/254) [ 675.394875] device nr0 entered promiscuous mode [ 675.403996] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432f6", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 675.686774] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 675.737166] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 675.745780] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 675.787230] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:27:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f0000000540), 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x2, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) fcntl$getflags(r0, 0x693c5b34456fce0f) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) getsockopt$ARPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x63, &(0x7f0000000600)={'ah\x00'}, &(0x7f0000000640)=0x1e) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000680)=0x8000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r3, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x140, 0xd, &(0x7f0000000080)=""/254) 09:27:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xf00}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2-', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xf0}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4101, 0xd, &(0x7f0000000080)=""/254) 09:27:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x4c00}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000640)={0x0, 0x1, &(0x7f0000000540)=""/97, &(0x7f0000001e80)=""/4096, &(0x7f0000000600), 0x100000}) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x3}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2000000, 0xd, &(0x7f0000000080)=""/254) 09:27:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x600000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xde000000, 0xd, &(0x7f0000000080)=""/254) [ 677.390071] __nla_parse: 5 callbacks suppressed [ 677.390093] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 677.458216] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xa901000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432fc", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 677.542980] device nr0 entered promiscuous mode [ 677.594497] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 677.685074] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) sendmsg$nl_route(r3, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0xa0000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)=@mpls_newroute={0x1c, 0x18, 0x400, 0x70bd2c, 0x25dfdbfc, {0x1c, 0x14, 0x14, 0x9, 0x0, 0x1, 0x0, 0xb, 0x2000}}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:27:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x17000000, 0xd, &(0x7f0000000080)=""/254) 09:27:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x6800}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:27:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2t', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743202", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 678.644762] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5001000000000000, 0xd, &(0x7f0000000080)=""/254) 09:27:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x40030000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 678.702178] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:27:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:27:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 678.794381] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 678.805779] device nr0 entered promiscuous mode 09:27:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x9effffff00000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 678.862253] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 678.915590] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xf000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7001, 0xd, &(0x7f0000000080)=""/254) 09:28:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4300000000000000, 0xd, &(0x7f0000000080)=""/254) [ 679.819202] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743210", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x300}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xfffffffc}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 679.965570] device nr0 entered promiscuous mode 09:28:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432f6", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 680.223758] EXT4-fs: 40 callbacks suppressed [ 680.223769] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 680.250408] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x7400000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743202", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4a00000000000000, 0xd, &(0x7f0000000080)=""/254) [ 680.958723] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 680.986576] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x149, 0xd, &(0x7f0000000080)=""/254) 09:28:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xfcffffff00000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 681.025463] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 681.059279] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x6c00}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 681.096395] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743204", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 681.139424] device nr0 entered promiscuous mode [ 681.413590] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 681.490391] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 681.532945] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:02 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000540)={&(0x7f0000ffb000/0x3000)=nil, 0x1000}, &(0x7f0000000240)=0xfffffffffffffdaa) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb000000000000000000000000020010647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de396a2bc88e030f9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b"], 0x1b4}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000580)={r8, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) setsockopt$inet6_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000002c0)={0x3}, 0x4) signalfd(r7, &(0x7f0000000200)={0x5}, 0x8) ioctl$FICLONE(r3, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x7}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432f6", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:02 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x41000000, 0xd, &(0x7f0000000080)=""/254) 09:28:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x60}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:02 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5a01, 0xd, &(0x7f0000000080)=""/254) 09:28:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 682.381890] device nr0 entered promiscuous mode 09:28:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x30000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 682.480480] __nla_parse: 10 callbacks suppressed [ 682.480490] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x6c000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2H', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:03 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x31, 0xd, &(0x7f0000000080)=""/254) 09:28:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) close(r0) set_mempolicy(0x0, &(0x7f0000000540)=0xc2, 0x100000001) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000580)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:03 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2d, 0xd, &(0x7f0000000080)=""/254) [ 683.338172] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432fd", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743204", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x3f00000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 683.515219] device nr0 entered promiscuous mode [ 683.560025] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 683.580652] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743210", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 683.698475] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x6}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 683.821958] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x5}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 683.902397] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f00000019c0)={'filter\x00', 0xc6, "23515963d9f07d789d4d27ee82e6d6a2442f9d6454261f92a8de66894ea55a35def8075e47d74962fb3b5778e72f4b1d3184e7faff9579a3e5d21fb79c16f8964374f0f4ebfa1875a86e4f27fe4d0dcda52f47d6fcbee7a262ec24e542845a095491769a02bbe0790e3c6651de973b8acf0d364482457693a05de47cd2e3b2dea6111cac09a0f9bd626d73c7f95468855c3e5bd13b523f187c8d9cc0dd41baf3a66a19cfa138e1802cdad9170c0edc970f69eb220b9cebb74c46232127ef71a096f7431cff4e"}, &(0x7f0000000540)=0xea) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x7a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743203", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:05 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xb3000000, 0xd, &(0x7f0000000080)=""/254) [ 684.515027] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:05 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xbf010000, 0xd, &(0x7f0000000080)=""/254) 09:28:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x2000000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x4800}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 684.695456] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 684.720979] device nr0 entered promiscuous mode [ 684.809312] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) lremovexattr(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=@known='user.syz\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xda, 0xd, &(0x7f0000000080)=""/254) 09:28:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x7a00}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 685.675328] EXT4-fs: 39 callbacks suppressed [ 685.675339] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x48}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 685.716467] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xde, 0xd, &(0x7f0000000080)=""/254) [ 685.761871] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xfffff000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 685.806723] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 685.826626] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\r', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 685.906505] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xf0ffff}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 686.023869] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 686.064702] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 686.142942] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 686.164421] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x7000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7d010000, 0xd, &(0x7f0000000080)=""/254) 09:28:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x74, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0xffffffffffffff2d, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xffffffffffffff7f) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f560361294000e8f7a570575447e2971dd4d8b7c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d56f41310ecab04631c07b3df8034f24292f29f6f2c06691b3c780d4dabf1632180d2038d644334bd6b612f86fccd476bc587b0d4875ec7f3608828879c6081a2ad2be5376e6d885959b050cb581b2a1e4db2d8451349d7fe246e5acb06c6a28f3d75d9b7e685373dbaf42031d9db25fb500b478b8fa7dd0e2c38659351c20621bf80839e40826e0b026f5affa0be584b304bf999b461ef2661bdd38b1595c9cb1605c98ba8da55c13763da513c9182c79409924bd14dd231f94cbe3d530df073ac9c5acc9d953b393e5a7ce7416072bfebf2ab46d5063a50a79d87"], 0x1b4}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r5, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) socketpair$unix(0x1, 0x400000000000000, 0x0, &(0x7f0000000000)) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x53, &(0x7f0000000080)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r6 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000200)) creat(&(0x7f0000000340)='./bus\x00', 0x40000000000000) 09:28:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6a01, 0xd, &(0x7f0000000080)=""/254) 09:28:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xf0ffffffffffff}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x4c00000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1b5, 0xd, &(0x7f0000000080)=""/254) [ 686.835568] device nr0 entered promiscuous mode 09:28:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xfffffff0}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4101000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x48000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:08 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3f00, 0xd, &(0x7f0000000080)=""/254) 09:28:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2`', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x3f000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:08 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r3, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000540)) 09:28:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 687.999206] __nla_parse: 12 callbacks suppressed [ 687.999215] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:08 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x8d00, 0xd, &(0x7f0000000080)=""/254) [ 688.048978] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x7a000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2l', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\a', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6578743297", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 688.181085] device nr0 entered promiscuous mode [ 688.210799] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x6800000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="657874328c", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x3000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 688.342185] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 688.443597] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nullb0\x00', 0x101480, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x5000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:09 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2d00000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 689.180087] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:09 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3d01, 0xd, &(0x7f0000000080)=""/254) 09:28:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 689.316810] device nr0 entered promiscuous mode [ 689.325151] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 689.448614] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 689.508049] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r3, 0xc10c5541, &(0x7f00000019c0)={0x6, 0x3f, 0xd8d, 0x0, 0x0, [], [], [], 0x6, 0x8}) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x36000000, 0xd, &(0x7f0000000080)=""/254) 09:28:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x20000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x300000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xef010000, 0xd, &(0x7f0000000080)=""/254) [ 690.271325] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x700}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfc, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:11 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x22, 0xd, &(0x7f0000000080)=""/254) [ 690.440863] device nr0 entered promiscuous mode 09:28:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a40)={r3, 0x28, &(0x7f0000001800)={0x0, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={r5, 0x7fffffff}, 0xc) fsetxattr$security_capability(r6, &(0x7f0000001a80)='security.capability\x00', &(0x7f0000001ac0)=@v2={0x2000000, [{0xe6, 0x1ff}, {0x7, 0xbfa}]}, 0x14, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) syz_open_dev$dspn(&(0x7f0000000540)='/dev/dsp#\x00', 0xfffffffffffff978, 0x800) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000019c0)={0x0, 0x11, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2f9, 0x0, 0x0, 0x0, 0x9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x3f}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}, @alu={0x7, 0x4, 0xf, 0x5, 0x6}, @call={0x85, 0x0, 0x0, 0x3f}, @jmp={0x5, 0x0, 0xf, 0x3, 0x7, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x8, 0x0, 0x3, 0x7, 0xffffffffffffffc0, 0xffffffffffffffff}]}, &(0x7f0000000580)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x1, [], 0x0, 0xd}, 0x48) ioctl$FICLONE(r2, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x400300}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:11 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4801000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x97ffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x100000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 691.410526] EXT4-fs: 53 callbacks suppressed [ 691.410538] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 691.427624] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x9effffff}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:12 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3501000000000000, 0xd, &(0x7f0000000080)=""/254) [ 691.458097] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x20000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x5f0b}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7a00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 691.584736] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 691.601814] device nr0 entered promiscuous mode 09:28:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x7400}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 691.756962] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 691.810226] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 691.840678] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:13 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x3fd) ioctl$FICLONE(r3, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\n', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x100000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x74000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xcb010000, 0xd, &(0x7f0000000080)=""/254) 09:28:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x3000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xf301000000000000, 0xd, &(0x7f0000000080)=""/254) [ 692.523826] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 692.533363] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 692.545407] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x600000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2-', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xd000000, 0xd, &(0x7f0000000080)=""/254) 09:28:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x600}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 692.774314] device nr0 entered promiscuous mode 09:28:14 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syncfs(r0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xf, 0x6, 0x0, 0x3, 0x2, r6, 0x2}, 0x2c) ioctl$FICLONE(r3, 0x40049409, r6) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000540)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x6000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x60000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:14 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6401, 0xd, &(0x7f0000000080)=""/254) 09:28:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x40000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 693.646362] __nla_parse: 11 callbacks suppressed [ 693.646372] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 693.683617] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x4c}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:14 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x42000000, 0xd, &(0x7f0000000080)=""/254) 09:28:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432ff", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 693.809621] device nr0 entered promiscuous mode [ 693.825207] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 693.837945] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x34000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 693.944730] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) creat(&(0x7f0000000540)='./file0\x00', 0x20) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x4800000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:15 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xea01000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:15 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x25010000, 0xd, &(0x7f0000000080)=""/254) [ 694.754534] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:15 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xbf000000, 0xd, &(0x7f0000000080)=""/254) 09:28:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7400000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 694.975768] device nr0 entered promiscuous mode [ 694.983333] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x6000000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1000000, 0xd, &(0x7f0000000080)=""/254) 09:28:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:16 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = syz_open_dev$admmidi(&(0x7f0000000540)='/dev/admmidi#\x00', 0x1000, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000001c00)=@assoc_value={0x0}, &(0x7f0000001c40)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000001c80)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000002e80)=0x1c) sendmmsg$inet_sctp(r3, &(0x7f0000002f80)=[{&(0x7f0000000580)=@in6={0xa, 0x4e23, 0x101, @ipv4={[], [], @multicast2}, 0x9}, 0x1c, &(0x7f0000001800)=[{&(0x7f0000000600)="3e2fe9913d3ba5291b29a171fe0ac6bc071dd16e29dba7202e4164a4bde44fb08722c848853f070301abfdbb532f1a5e34587795a8a3b91c40f91bae6ab8baa5ce4232f2", 0x44}, {&(0x7f0000000680)="f3b171c1faea64c708b2a09ac98703f8e63b66a3163251f050d260c5d253ba9ec020977e", 0x24}, {&(0x7f00000019c0)="dfdb13d7a466b36cca9c6872770a03de97e5ebcd936d1569710360aa8192b79450757919cd7119707e239aeb41bfaa9e7bf2847251f51b58db76f235ecb015b79a8f155670a3242661f6f4f201389c7430171f90be213c", 0x57}, {&(0x7f0000001a40)="bf574f932f51cca9a50e28d4dc6f963003a20cea60fc80b1dbe8275fe6c7534624b652714f26564398cd2db87d821dc3bc6394b07506b46faf437b0a2ee26ae4633a84bede089b2b5b2b36707e9d09d0282d7e31254e44128e8f9b9da023c8bc68f9cf6007bddd4177f17d99c2265481878e2a5d9f454870287997c056d409c6fa189a5491de", 0x86}], 0x4, &(0x7f0000001b00), 0x0, 0x20048000}, {&(0x7f0000001b40)=@in6={0xa, 0x4e20, 0x0, @mcast2, 0x5}, 0x1c, &(0x7f0000001bc0)=[{&(0x7f0000001b80)}, {&(0x7f0000001e80)="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", 0x1000}], 0x2, &(0x7f0000002ec0)=[@dstaddrv4={0x18, 0x84, 0x7, @loopback}, @sndrcv={0x30, 0x84, 0x1, {0x3ff, 0x3, 0x4, 0x20, 0x7fffffff, 0x8, 0x4, 0x401, r4}}, @init={0x18, 0x84, 0x0, {0x60d9d838, 0x7, 0xffffffffffff794e, 0x8000}}, @sndrcv={0x30, 0x84, 0x1, {0x535b9715, 0x6, 0x8, 0x0, 0x7, 0x1, 0x1d34, 0x7, r5}}, @authinfo={0x18}], 0xa8, 0x40091}], 0x2, 0x4040) epoll_wait(r1, &(0x7f0000001b00)=[{}], 0x1, 0xa1) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r6, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r6, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r6, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r9, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500d0000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x192, 0xd, &(0x7f0000000080)=""/254) 09:28:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xf0ffffff}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 695.843675] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfcfdffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4800000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 695.951891] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2d000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xbd, 0xd, &(0x7f0000000080)=""/254) 09:28:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x6000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 695.999362] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 696.002405] device nr0 entered promiscuous mode 09:28:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6c00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xf000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:17 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffeffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, 0xffffffffffffffff, 0x0) close(r2) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x200000, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x308) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r3, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r5, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r8, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r4, 0x40049409, r7) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xcc01000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3f000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xffffff9e}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500d0000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x5f0b000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 696.901808] EXT4-fs: 44 callbacks suppressed [ 696.901826] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2600, 0xd, &(0x7f0000000080)=""/254) 09:28:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2a, 0xd, &(0x7f0000000080)=""/254) 09:28:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x500000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 696.984507] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 697.012894] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 697.045163] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x8c00000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xf00000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 697.564021] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2d00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x3f00}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:18 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3600000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) write$FUSE_LSEEK(r4, &(0x7f0000000540)={0x18, 0x0, 0x2, {0xffffffff}}, 0x18) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r6, 0x800c6613, &(0x7f0000000580)={0x0, @aes256, 0x2, "8e3a7cb5e0e42834"}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x7a00000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 697.829284] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:18 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5a010000, 0xd, &(0x7f0000000080)=""/254) [ 697.871208] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 697.886073] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x700000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfcfdffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:18 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xe010000, 0xd, &(0x7f0000000080)=""/254) [ 697.930832] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:18 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xf4010000, 0xd, &(0x7f0000000080)=""/254) 09:28:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x68000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 698.019550] device nr0 entered promiscuous mode 09:28:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6800, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4c00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xffffff7f}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 698.141283] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x0, 0x80) write$P9_RFLUSH(r2, &(0x7f0000000580)={0x7, 0x6d, 0x2}, 0x7) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x0, 0x0, 0x4000000000000, 0x0, 0x0, r4}, 0xfffffffffffffd1a) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r3, 0x40049409, r6) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000600)={0x6, 0x2, 0x8, 'queue0\x00', 0x4}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:19 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xf010000, 0xd, &(0x7f0000000080)=""/254) 09:28:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x6c}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfdfdffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x10, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x68}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:19 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x26010000, 0xd, &(0x7f0000000080)=""/254) 09:28:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7a000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 698.562122] device nr0 entered promiscuous mode 09:28:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xf}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:19 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1200, 0xd, &(0x7f0000000080)=""/254) 09:28:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 698.669423] __nla_parse: 14 callbacks suppressed [ 698.669432] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:20 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xbd00000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x200000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xfffffffffffff000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1f000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0xc4240, 0x0) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 699.616341] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:20 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x8301, 0xd, &(0x7f0000000080)=""/254) 09:28:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x40000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4800, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x5f0b0000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 699.774353] device nr0 entered promiscuous mode [ 699.833612] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xfcffffff}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x600, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 699.985378] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x4c000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1f00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 700.121328] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb0000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d0000000000000000000000000000"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffff97, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xb5f}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffff8c, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:21 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7201000000000000, 0xd, &(0x7f0000000080)=""/254) [ 700.713852] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:21 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x49000000, 0xd, &(0x7f0000000080)=""/254) 09:28:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x74}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x68, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4c, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffff6, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 700.887494] device nr0 entered promiscuous mode 09:28:21 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6f000000, 0xd, &(0x7f0000000080)=""/254) [ 700.908659] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0x400000000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x10000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:22 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x14e, 0xd, &(0x7f0000000080)=""/254) 09:28:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r2, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r5, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r1, 0x40049409, r4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x10000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 701.829886] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:22 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x161, 0xd, &(0x7f0000000080)=""/254) 09:28:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a, 0x0, 0xffffff7f00000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 701.911822] EXT4-fs: 43 callbacks suppressed [ 701.911833] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0x8, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 701.974085] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 702.021611] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x68, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 702.069527] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfcfdffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0x1ea4, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3f00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfcfdffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 702.215382] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0x5e, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 702.353252] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 702.416577] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 702.432205] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 702.448668] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 702.596325] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 702.614137] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:23 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000540)) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r5, 0x4008ae48, &(0x7f0000000580)=0x3000) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$NBD_DISCONNECT(r4, 0xab08) ioctl$FICLONE(r3, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xb, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4c000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x5000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:23 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1c010000, 0xd, &(0x7f0000000080)=""/254) 09:28:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4c00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0x200000cc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:23 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x121, 0xd, &(0x7f0000000080)=""/254) [ 702.823587] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x8cffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6c00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:23 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x11b, 0xd, &(0x7f0000000080)=""/254) [ 702.965114] device nr0 entered promiscuous mode 09:28:23 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfdfdffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x3, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000080)=0x1ff) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x136) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) ioctl$UI_BEGIN_FF_ERASE(r4, 0xc00c55ca, &(0x7f0000000540)={0xa, 0x401, 0x200}) openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0xc180, 0x0) fcntl$notify(r3, 0x402, 0x2) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x886, 0x0, 0x80000001}, 0xffffffffffffff39) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) 09:28:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x48, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:24 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xe0000000, 0xd, &(0x7f0000000080)=""/254) 09:28:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x74000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6800, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:24 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1d00, 0xd, &(0x7f0000000080)=""/254) [ 703.823489] __nla_parse: 2 callbacks suppressed [ 703.823498] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 703.904064] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfc, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:24 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1e3, 0xd, &(0x7f0000000080)=""/254) [ 704.017706] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500d, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 704.684028] device nr0 entered promiscuous mode 09:28:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:25 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xc9000000, 0xd, &(0x7f0000000080)=""/254) 09:28:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x60, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7a, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7a00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 704.999821] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:25 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x56000000, 0xd, &(0x7f0000000080)=""/254) 09:28:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xd50, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 705.177125] device nr0 entered promiscuous mode [ 705.187756] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 705.331734] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:26 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x87, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000540)) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6000000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2d00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:26 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7600, 0xd, &(0x7f0000000080)=""/254) 09:28:26 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xb800, 0xd, &(0x7f0000000080)=""/254) [ 706.264171] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1f00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6c00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 706.406639] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 706.412078] device nr0 entered promiscuous mode 09:28:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1f00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 706.448650] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 706.560495] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x600000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffff7f00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x600000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:28 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5c, 0xd, &(0x7f0000000080)=""/254) [ 707.421158] EXT4-fs: 47 callbacks suppressed [ 707.421173] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 707.459009] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 707.471834] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:28 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x18c, 0xd, &(0x7f0000000080)=""/254) 09:28:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x48000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 707.531535] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 707.574016] device nr0 entered promiscuous mode 09:28:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6800000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:28 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x82, 0xd, &(0x7f0000000080)=""/254) [ 707.677668] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 707.764398] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 707.788863] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 707.823227] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 708.127694] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:29 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) pwritev(r0, &(0x7f0000001f80)=[{&(0x7f0000000600)="17bb1b3f18e0af2f0ad795edd4d71a57a4ab5ca5b2b2011b6e115297944ede68e3de07bd52704df48b73296625b3b092ac6fd8033330cef6a76e4bca0cd68ad791846201d26ec6942dd9d5421e3b14438ade95b25ac8b99d468a6b16079d21ad2181135ecccde103c56c84315ce101cfc1626a9ff46249015e25234749e458c3939544032fca88afa7dc9b0e8e0e4cbc32", 0x91}, {&(0x7f0000001c80)="4df71b0fc350b985b9fa8674f2bee2a57655eab36ba4775665ff5ffb2b3bae03aabfa5ab7923031ead96a6b8ec60b4996d0001442e7a5475f32f85f876a8e2abd476f3aa60ff40d51cf07f9eb6b2dc1545c67bd0806124b25fff5144b0f54c0c3699e869cbec49d371109c298c3f724820958f355724c673d82955bef2687e202a833322e737e27e9f69200838bf9948", 0x90}, {&(0x7f0000000580)="ae4c6b6624f688d245fc0e4acd4eeacff9a8f76f019e40", 0x17}, {&(0x7f0000001d40)="6b62c1046b78e799cad6d68161e8a51d476f271806f8f3a177badabfb934a6bc773a90058cce3d31e6a5b9e2ca97f7c102870167372634ee5c84deb3d5aff7da7dd3627719e405ada27a2a5f2a939368ad501dc704136eadc0eb4f18e7e64c0c71e5abfbac7b36a49968edb729cd91d87c75d6c8f76953f681f5f8c7f9674e2fedafaaffcfec47ddba61dfd4cf3fca", 0x8f}, {&(0x7f0000001e00)="2bddd89de1ac240ab3fce66084f7c1f9d26421fa085e1a4069b0a4506df994078fa78581322627860619ca2ae71c048294ee79d81fa9d507efd7d65fc2e33417af755b86de62cdab99f788384e60815d03660615f0cdea8eb36c9875fdd2dbe36d84c8f4dc4087baf61352881e0c8d91584313309022ecda6d98f9d1f78c8bc2b0f42dcb52c893531ca2c8f2ff6139868808c83503ca36658eb2da10d852181dec4206a83c4e837e3908c0337ad6c8c0da71b42cb1a718c2aa9264675b67b2800693450f8b74f86c8700ea022518caae228b8e9840488203098b2c2a712ba1243f74b54ac2c010b06f8bd9d7ef12ebda41a3a9fa", 0xf4}, {&(0x7f0000001f00)="b252d9c8c829b19a8ca40d49d04b6c0102aac42d92d25ff9d023f6658744be483299c149a3925db75246ca8031be58189ffa633718422bdc397de49139ecd69d7eec0578c55522ca082d5394245143adf3b5857d8f4c2398ce84b0779fb559b6429ec97d80aef6432c327959b175f00ebfaba4eb362cafaff129", 0x7a}], 0x6, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000540)=0x800) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x84, &(0x7f0000002000)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r3, 0x40049409, r6) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x8) memfd_create(&(0x7f0000001b80)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e", 0x6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:29 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x35010000, 0xd, &(0x7f0000000080)=""/254) 09:28:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7a00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x97ffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 708.599431] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:29 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xff01, 0xd, &(0x7f0000000080)=""/254) 09:28:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x74000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 708.740417] device nr0 entered promiscuous mode 09:28:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x60, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffff7f00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 708.833697] __nla_parse: 5 callbacks suppressed [ 708.833706] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:30 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2b00, 0xd, &(0x7f0000000080)=""/254) 09:28:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={0x0, 0x7ff, 0xffffffffffffffff}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000500)={0x0, @speck128, 0x1, "ea2374f7c6c97384"}) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7400000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:30 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x91, 0xd, &(0x7f0000000080)=""/254) [ 709.916301] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500d000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 709.971265] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x48000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3f00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 710.083749] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfdfdffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 710.248886] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3f000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 710.292779] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 710.375484] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7400, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x400000, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000002100)={0x0, @in6={{0xa, 0x4e21, 0x5, @remote, 0x1}}, [0x7ff, 0x8, 0x3, 0x85c, 0x0, 0x9, 0x7ff, 0x7ff, 0x1, 0x20, 0x2, 0x9, 0x1, 0x40, 0x5]}, &(0x7f0000002200)=0x100) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000002580)={0x0, 0x8}, &(0x7f00000025c0)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000002680)=[{&(0x7f0000000580)=@in6={0xa, 0x4e24, 0xa0, @loopback}, 0x1c, &(0x7f0000002040)=[{&(0x7f0000000600)="0443624ef246b6d557c106572431c8f0bea1b202754ee52f6dcc9646e56dc7f443d27508fc40db020ca48cc884c548441918c4ab5c4d584cd9646a3f8529027870ef1591537461108f30786f4ff55930c0b63e98aeb532c09cc46b53e41f4cb33e96ed8842c94a27d1845b9722ddf706924eae493ecc63c5f02228fdb37d45e866c5e2c0b7202cb807c960229d6ecfb5257b59e6c6e536f67c62abbbc74af812bc1a79d823f5d1d1c08383b25abc1a", 0xaf}, {&(0x7f00000019c0)="7a68b23e5ef53ba96772b7dbe9f158f210f98f5e864c701d910f9dd49825ff07527430747f40ff279fd2526d9ca761b3745ef7a47b85014feeebca8fe42755268b8f49cd7dc3775a6f2c4dd77cd8c52fd2a226c0491db708b32376aa19c0502882d6033d0877e608319131fb20dbdc99e255ac6f7da4a91f1f700fae96788fd0768252cc8c48030e4e", 0x89}, {&(0x7f0000001800)="97a83eea3cba11e49116940bfd2c8928bb5f2fc336e0", 0x16}, {&(0x7f0000001a80)="ba282f2adba66837840cf934232ae7a1095e1bb171cba9756e7e47c3411c671b8dd4c53ae114b1291a9e61d25ec0de82bc7c", 0x32}, {&(0x7f0000001ac0)="7a342c3c2b92f75c1969951cc6c774050ed49a7e6516a48de6605a745bb67ca0205f830c6c56e26b04a0f14e3d80cf01e77c1a5200566dc0ec1560d58441d5ad693ec052d0b2a31c35797bc1f9262289e17f1e3012610543cfe56927f5a79b61ac599c25c7f7c2399fa579249c1bafd90e3e86aaf1c9abfd9b7775d30e46495716ddf6e860b6f6fb26a8fa011f14cb77e24a91032683524f19f5b8b1ddb09a6bb402941376c8db5b1f8a5909e9028547f9cf513cfd8bd43473a14a79302f7123a8b5111758558364c3e51896c02c567dd41ed8c0a392112826c85a8a7b2e874e0d6f59f626befba9710f160ed5f46196de", 0xf1}, {&(0x7f0000001bc0)="40f34fbf81f8692831608dbea65cf64332620c2fab192b5b20e673461b7dac9c2c41234bd07b79254c3e37c4fa67045a35a3af53421820f739c60961c06d13c2a359df24354ec7c2d39817f2dfde83ada1af9fac8c4fda51f7ad3f892baf272617b3725b3d6132828a5a48c0f8b03543ac6c47cc2805dbe58aa06363aca46b594041d0e62e717639a720cd0a96293f09346b315d3cf96db17c76b9003300ce4fdb71b0865aacf56b1fb123684c7b70910a78f782c39836b7d8", 0xb9}, {&(0x7f0000001e80)="d951aaf5c6ea26d2ff9a105b58d8ed4fd6ddf6a663881b1e01f164c1d49f5cbefa248ed6462bf8aa250d02d09e744fcd28eedf29e8266914662e3f4092acbfb84a2e4b35900814a819efb4c02ef5647045740b2d89b675a28c0d416d3780b182d43e04352e6e1c1e133d30c0671e12fc6ed7dcdc5f622135cf0336a254771ade2c32ec105469c6da3be4227e12ea38d50a36db9109669bfc8b50dc9c870d792ca409f9210f740e608a0e0c5684b89fbabd57eb52b90f0f8cc4d27df849fe605694922f9a5a51f92d2c8279379c074184c230b1d8b022acd4871fbfb4b97722b487b17b405fa12b1e729ccff1f2", 0xed}, {&(0x7f0000001c80)="3ff3529f017e8de500d56eef91423b04e86aac82f310bbc6672dc02b5f74df2e467676", 0x23}, {&(0x7f0000001f80)="23c67879beac7608b1fb8e5d88e76f0e86b69577c473081df7729bf10def8d3d271e521f0f22e46aec3217b9f105ac3b75830a1ee01cf02d1873bbde41c1fe6b63333272f99ec2b33c5d3f96b109b95eebe943d787729da8a35938e6555d8bb1d3e0032cd3f0ecbd9be71b47977f6f708b48fd298eb2d0dbc6284d862912cf501338ea52f2f8727481", 0x89}], 0x9, &(0x7f0000002240)=[@init={0x18, 0x84, 0x0, {0x6, 0x9, 0xef, 0x10001}}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0x6, 0x0, 0x400, 0x3, 0x5, 0x3ff, 0x514e, r7}}, @init={0x18, 0x84, 0x0, {0xfffffffffffffffd, 0x8000000000000000, 0x401, 0x200}}], 0x60, 0x4000000}, {&(0x7f00000022c0)=@in={0x2, 0x4e24, @local}, 0x10, &(0x7f0000002540)=[{&(0x7f0000002300)="9e7ec7bd9c88835cf8ed05fc72653c8ac3d5fa7080a5d885f1773c69205e9094105698bcb91ae3f82c279f1221edd6e4c68a74d679d2fbfbb32a3763b08eae96a15e8dd07c9aa139b7f6a976d24b50f36d921447537ab6122ae33ee04d42525eef8da9aa42cf", 0x66}, {&(0x7f0000002380)="2069ca8c9d367a7338cd67fbbbcc8cd332ffeb69a1c6fd0d0b8c2c6d91fd5fd8c67aa3727f3eec98a6beb9d37961009e9dc42ba1f7aa3097c6e5b909aae8680866457aaf520d489bbb848a80d95f91f771f7a36cddeff89af9a00dc65d7fc0de5f7ff41b930de55c1ec50a4267ef24c35639371d710e0dbba35a093e0c396a2566dc6c362d78a061683bd7c191cfebb6dc8def445b28ab916fc31dac23188a11639f1ca278096c018f8bb64adaafa1ae17fc28e0dc526fa27dc7001cbb1b5b900f57595a4e77044fef985aba247d172b9f213dd5d52933245c3b7d8fd7bde43f", 0xe0}, {&(0x7f0000002480)="00583208cf87b4eb5b2e6d823de3ca9a638fe7370eb42a93b6c405fe105371f0b029087aac76b6bb7993e23dcf3213613c001e4ce21c27e9ed54e2e982c9ab0de87e6de786a859b8b18935b7d98e31a8e16a7ef923039ad64eb1d44109dc968f6222ba05ee31b44bf7144f24af54e0f87854bb0f3a71add9bc112140b446538af03d47f18ba458bdfdc5ab372e2b4d45944d6e5db7c3382e5cb641ba6bf6ae3281f77441c2da52b2f8", 0xa9}], 0x3, &(0x7f0000002600)=[@dstaddrv6={0x20}, @sndinfo={0x20, 0x84, 0x2, {0x4, 0x8, 0x47, 0x8b00000000, r8}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x100000000000}], 0x58, 0x40}], 0x2, 0x0) 09:28:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500d, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x5, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:31 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1a7, 0xd, &(0x7f0000000080)=""/254) [ 710.938722] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:31 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xed00000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffff8c, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:31 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xeb000000, 0xd, &(0x7f0000000080)=""/254) [ 711.127275] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 711.756274] device nr0 entered promiscuous mode 09:28:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:32 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x174, 0xd, &(0x7f0000000080)=""/254) 09:28:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) fsetxattr$security_smack_entry(r0, &(0x7f0000000640)='security.SMACK64MMAP\x00', &(0x7f0000000680)='/dev/net/tun\x00', 0xd, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000540)={'ip_vti0\x00', {0x2, 0x4e21, @loopback}}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) getsockopt$inet6_int(r3, 0x29, 0x4, &(0x7f0000000580), &(0x7f0000000600)=0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 09:28:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x40000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:32 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1100000000000000, 0xd, &(0x7f0000000080)=""/254) [ 712.078330] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2d00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfcfdffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x300000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 712.231502] device nr0 entered promiscuous mode 09:28:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffff6, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 712.488608] EXT4-fs: 51 callbacks suppressed [ 712.488619] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 712.726503] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 712.770098] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) sysfs$3(0x3) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x60000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:33 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4b01, 0xd, &(0x7f0000000080)=""/254) 09:28:33 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x119, 0xd, &(0x7f0000000080)=""/254) 09:28:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 713.226182] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 713.288780] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 713.329794] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 713.354875] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x43010000, 0xd, &(0x7f0000000080)=""/254) [ 713.399094] device nr0 entered promiscuous mode 09:28:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x5, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 713.562962] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 713.623390] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 713.924806] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a00)={0x1, 0x28, &(0x7f00000019c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001a40)={r3, 0x400, 0x10}, 0xc) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={r4, &(0x7f0000001e80)="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", &(0x7f0000000580)="21e854ecf9c8"}, 0x20) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r5, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000001800)={0x4, 0x0, &(0x7f0000000640)=[@enter_looper], 0x30, 0x0, &(0x7f0000000680)="8b0cce3c47141f70416c9b93d71b3eb08d16bae2f4e555cb99481a5cf3d7900364ac8ced970254b2c4933ffc7fd3bc2a"}) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r8, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r7) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:34 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x9000000, 0xd, &(0x7f0000000080)=""/254) 09:28:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4000000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7a000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 714.326459] __nla_parse: 9 callbacks suppressed [ 714.326467] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 714.370626] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:35 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3c00, 0xd, &(0x7f0000000080)=""/254) [ 714.414675] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x48, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x400000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4c, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 714.509456] device nr0 entered promiscuous mode [ 714.615722] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 714.626064] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1a00, 0xd, &(0x7f0000000080)=""/254) 09:28:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x200000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x400000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x9, 0xd, &(0x7f0000000080)=""/254) [ 715.510868] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4c00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 715.612445] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 715.634963] device nr0 entered promiscuous mode 09:28:36 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x9300000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x8cffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x48000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x4, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = syz_open_dev$usb(&(0x7f0000000600)='/dev/bus/usb/00#/00#\x00', 0x7f, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001800)={r2, &(0x7f00000019c0)="02d4a75bca3e32911e2dda14d76e9107fb92aa4103e095b85723a8f99aa3b66b5a6e1a249113ba89c8f405d570cc4b000f92d27e2a396764d13119ed0859963293c40def2b9d4a02c6b608ec0f1a91711d5c87aaf47fd7c85c9aa1c6c4c2160012f1f65503a287600b48bc86b7f0ac4cadeb60a5071f3f1b8aee30cd0bbc82675b", &(0x7f0000000640)=""/90}, 0x18) r3 = syz_open_dev$dspn(&(0x7f0000000540)='/dev/dsp#\x00', 0x2595e9b7, 0x0) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000580)=0x8, 0x2) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x308) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r5, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) ioctl$IOC_PR_RESERVE(r6, 0x401070c9, &(0x7f0000001a80)={0x7ff, 0x7fffffff, 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r8, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r4, 0x40049409, r7) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x8000001, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:37 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xcc00000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6800000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x60000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 716.654785] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:37 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3801000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:37 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3f00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7a00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 716.814127] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7a00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 716.941752] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xba000000, 0xd, &(0x7f0000000080)=""/254) 09:28:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) r4 = getpgrp(0x0) get_robust_list(r4, &(0x7f0000000680)=&(0x7f0000000640)={&(0x7f0000000600)={&(0x7f0000000580)}}, &(0x7f0000001800)=0x18) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r6) clock_gettime(0x0, &(0x7f0000000540)) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001a00)={r5, 0x3, 0x1, 0x0, &(0x7f00000019c0)=[0x0], 0x1}, 0xfffffd6e) 09:28:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:38 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1c9, 0xd, &(0x7f0000000080)=""/254) [ 717.494744] EXT4-fs: 38 callbacks suppressed [ 717.494754] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 717.553462] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 717.594796] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x10, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7a000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 717.646146] device nr0 entered promiscuous mode [ 717.789783] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 717.813550] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 717.874773] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) syz_open_dev$ndb(&(0x7f0000000540)='/dev/nbd#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000580)={0x0, 0xc000}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:39 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x59, 0xd, &(0x7f0000000080)=""/254) 09:28:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x68, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 718.514332] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 718.548004] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:39 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xf900000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 718.562503] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x74, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:39 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x501000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 718.618947] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 719.359623] device nr0 entered promiscuous mode 09:28:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfdffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:40 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1a3, 0xd, &(0x7f0000000080)=""/254) 09:28:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfcfdffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 719.742102] __nla_parse: 9 callbacks suppressed [ 719.742113] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:40 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6f01, 0xd, &(0x7f0000000080)=""/254) 09:28:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfdffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 719.880382] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3f00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:40 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xb900, 0xd, &(0x7f0000000080)=""/254) [ 719.948413] device nr0 entered promiscuous mode [ 719.964015] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:41 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = socket$kcm(0x2, 0x3, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='oom_score\x00') write$tun(r3, &(0x7f0000001cc0)={@void, @val={0x3, 0x0, 0x6, 0x6, 0x8, 0x1}, @ipv6={0x4, 0x6, "d53f22", 0x1ae, 0x0, 0x1, @ipv4={[], [], @broadcast}, @mcast2, {[@dstopts={0x0, 0x6, [], [@calipso={0x7, 0x30, {0x7, 0xa, 0x8, 0x80000001, [0xf, 0x11d1, 0x4, 0x200, 0x0]}}, @enc_lim={0x4, 0x1, 0x6}]}, @hopopts={0x3f, 0x10, [], [@hao={0xc9, 0x10, @mcast2}, @padn={0x1, 0x2, [0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}, @hao={0xc9, 0x10, @remote}, @enc_lim={0x4, 0x1, 0x1}, @calipso={0x7, 0x28, {0x0, 0x8, 0x233fe146, 0x9, [0x8001, 0xfffffffffffffffb, 0x0, 0x4]}}, @generic={0x36c, 0x2c, "e337b3e2a69a98b5c408ba058421eae21cd66dca89eb8af4413efeaf5b27ac9006b02eee8bd71670402ff67b"}]}, @hopopts={0x5e, 0x11, [], [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @generic={0x3bc, 0x7a, "fb7c27f7ea39fdb0e0ac05bc8984ccaa3f3545c7ed69d67d7c4b9d31b86e6e50155f544fe140b13af7faa7c08d8eaaee598ed02b70dbab29304447f5adfae9afa4b6051c9ff360e2c6586b96f74fb32df823922ee63c800ecbd49d362298d97c364df5e17114cd55868b3891305b4a6986f8a5a1d710f183adc0"}]}, @hopopts={0x0, 0x2, [], [@hao={0xc9, 0x10, @remote}]}], @icmpv6=@ni={0x8b, 0x0, 0x0, 0x7, 0xffffffff, 0x2, "0c55abc1b3d1de0e850a2b45c2e997339a40ef334f43"}}}}, 0x1e0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000002000)="6e7230010060a19ef9d2c68ada439c387e5bc1e632388bab78ce73d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b523010751d39aeb660d863ec9b8c4f3b3cad48902b5b2d6c130bbd372c63acf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc343dbed4de5d693c9a781c863e05d8a6f8689a5fe29216061f3ff53f8b6b396678e7ba155ef9152d934cdd8959a144328eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442c8d00dcb57f013ff7595edd0ff074b30de3675d34117a44eb0e4f832936da44e") r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000001ec0)=ANY=[@ANYBLOB="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"], 0x59) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x5) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(0xffffffffffffffff, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000100)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000019c0)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000600)=0xe8) r10 = getgid() setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000640)={r8, r9, r10}, 0xc) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) socket(0x19, 0x80a, 0x101) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r4, 0x40049409, r6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={r5, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:41 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7301000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3f00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4000000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 720.883628] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:41 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x64010000, 0xd, &(0x7f0000000080)=""/254) [ 720.941872] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x600, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500d000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7400000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 721.071993] device nr0 entered promiscuous mode [ 721.093351] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 721.201114] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:42 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x2, &(0x7f0000000000)={0x0, 0x0, 0x1}, &(0x7f0000000040)) 09:28:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x8cffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1d010000, 0xd, &(0x7f0000000080)=""/254) 09:28:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffff97, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3501, 0xd, &(0x7f0000000080)=""/254) [ 721.922379] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 721.937428] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:42 executing program 0: 09:28:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x5000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7a, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6200, 0xd, &(0x7f0000000080)=""/254) 09:28:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 722.101678] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:42 executing program 0: 09:28:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3601, 0xd, &(0x7f0000000080)=""/254) 09:28:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1f00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:42 executing program 0: 09:28:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2d, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:42 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3a01, 0xd, &(0x7f0000000080)=""/254) 09:28:43 executing program 0: 09:28:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/stat\x00') getdents(r0, &(0x7f0000000100)=""/186, 0xba) 09:28:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1f7, 0xd, &(0x7f0000000080)=""/254) 09:28:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1f00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4c000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 722.525036] EXT4-fs: 40 callbacks suppressed [ 722.525047] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x9001000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) syslog(0x3, &(0x7f00000005c0)=""/4096, 0x1000) [ 722.611047] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 722.651186] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 722.690704] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2600000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 722.765207] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:43 executing program 0: 09:28:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4f01000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x300, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xf6000000, 0xd, &(0x7f0000000080)=""/254) 09:28:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffff7f, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:43 executing program 0: 09:28:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 722.895358] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 722.923243] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4e000000, 0xd, &(0x7f0000000080)=""/254) [ 723.029748] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500d000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:43 executing program 0: 09:28:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x84, 0xd, &(0x7f0000000080)=""/254) 09:28:43 executing program 0: [ 723.071849] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 723.181100] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xd50, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:43 executing program 0: 09:28:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:43 executing program 0: 09:28:43 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1601000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:44 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x2) ppoll(&(0x7f0000013000)=[{r0}], 0x1, &(0x7f0000001000)={0x0, 0x1c9c380}, &(0x7f000000d000), 0x8) 09:28:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6c, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xfe01000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x68000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB="7a0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000bd120000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xa}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r1, r0, 0x2000000000000a, 0x2}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000640)={r1, r0, 0xa}, 0x10) 09:28:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4d000000, 0xd, &(0x7f0000000080)=""/254) 09:28:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x300, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x14d, 0xd, &(0x7f0000000080)=""/254) 09:28:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x5, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xa4, 0xd, &(0x7f0000000080)=""/254) 09:28:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:44 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000100)={0x0, 0x0, 0x80000001, 0x2, 0x6}, 0xc) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000380)={'ip6tnl0\x00', 0x1}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e5e2) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000000)=0x5dd7d56a, 0xfffffffffffffd3d) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r3 = request_key(&(0x7f0000000180)='ceph\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='-(%vmnet0\x00', 0xfffffffffffffffe) ioctl$RTC_WIE_ON(r1, 0x700f) r4 = add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000880)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$instantiate_iov(0x14, r3, &(0x7f0000000800)=[{&(0x7f0000000740)="0de3cffeceefbd42ec4121f41472e372c752a3f9f5e43c3c644952532c764b822dadb9c9e32c40647c6574ef85347cc61a7beff2066fe9705458592e13778fafc682d248900e0b2c4575451495334bb80435631eb0708a2556c7e14b342d332010338b3ade5e8dcdb9214ddb9e576b765968621be08b474ed3f1051df7ef04c8545bfbca293eb266c724877327654e4abf62e3dfc9bc", 0x96}], 0x1, r4) getpeername$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, &(0x7f00000003c0)=0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x5654807, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000080)={'HL\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000300)={'NETMAP\x00'}, &(0x7f0000000340)=0x1e) ioctl$RTC_EPOCH_READ(r0, 0x8004700d, &(0x7f00000008c0)) 09:28:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x61000000, 0xd, &(0x7f0000000080)=""/254) 09:28:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2d000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4800000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xd50, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3800, 0xd, &(0x7f0000000080)=""/254) 09:28:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6800000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4800, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:44 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x141, 0xd, &(0x7f0000000080)=""/254) 09:28:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f00000001c0)={0x2000000000000001, 'ip6tnl0\x00'}, 0x18) memfd_create(&(0x7f0000002b00)='/dev/loop#\x00', 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000100)) umount2(&(0x7f0000000180)='./file0\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:28:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2d00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x8100000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfdfdffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xa00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1901000000000000, 0xd, &(0x7f0000000080)=""/254) [ 724.510383] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6tnl0, syncid = 0, id = 0 09:28:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4000000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6000000, 0xd, &(0x7f0000000080)=""/254) 09:28:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:45 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087705, &(0x7f00000001c0)='/dev/usbmon#\x00') 09:28:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4000000, 0xd, &(0x7f0000000080)=""/254) [ 724.820845] __nla_parse: 28 callbacks suppressed [ 724.820854] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x97ffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4c, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1d8, 0xd, &(0x7f0000000080)=""/254) 09:28:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x14b, 0xd, &(0x7f0000000080)=""/254) [ 725.028888] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x200000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5e010000, 0xd, &(0x7f0000000080)=""/254) 09:28:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x48, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 725.201199] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:45 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xea010000, 0xd, &(0x7f0000000080)=""/254) 09:28:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x97ffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 725.348269] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6c, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x178, 0xd, &(0x7f0000000080)=""/254) [ 725.439370] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6c000000, 0xd, &(0x7f0000000080)=""/254) 09:28:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x74, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6701, 0xd, &(0x7f0000000080)=""/254) 09:28:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffff7f, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 0: mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 725.660407] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 725.690939] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6c00, 0xd, &(0x7f0000000080)=""/254) 09:28:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x8cffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2d, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x183, 0xd, &(0x7f0000000080)=""/254) [ 725.820532] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500d, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 725.941896] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x9a01000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffff6, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4800000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3a01000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4c00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 726.159623] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfdffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:46 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xd100000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfdffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x14a, 0xd, &(0x7f0000000080)=""/254) 09:28:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xa, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xd801000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x0, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6c, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x68000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 726.715258] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 09:28:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5f010000, 0xd, &(0x7f0000000080)=""/254) 09:28:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:28:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x74000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x65010000, 0xd, &(0x7f0000000080)=""/254) 09:28:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x18, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4901000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffff6, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xb000000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x8cffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1ec0, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a00)={0x1, 0x28, &(0x7f00000019c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001a40)={r3, 0x400, 0x10}, 0xc) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000600)={r4, &(0x7f0000001e80)="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", &(0x7f0000000580)="21e854ecf9c8"}, 0x20) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r5, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r5, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000001800)={0x4, 0x0, &(0x7f0000000640)=[@enter_looper], 0x30, 0x0, &(0x7f0000000680)="8b0cce3c47141f70416c9b93d71b3eb08d16bae2f4e555cb99481a5cf3d7900364ac8ced970254b2c4933ffc7fd3bc2a"}) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r8, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r7) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0xc0, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x60, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:47 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xd901000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7a00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x33fe0, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:48 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x82010000, 0xd, &(0x7f0000000080)=""/254) [ 727.543311] EXT4-fs: 106 callbacks suppressed [ 727.543322] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 727.572450] device nr0 entered promiscuous mode 09:28:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0xec0, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:48 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xf0010000, 0xd, &(0x7f0000000080)=""/254) 09:28:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6000000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 727.616286] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 727.625808] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6000000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 727.893485] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 727.901427] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 727.955443] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 727.967254] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) openat$tun(0xffffffffffffff9c, &(0x7f0000000540)='/dev/net/tun\x00', 0x400000, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000002100)={0x0, @in6={{0xa, 0x4e21, 0x5, @remote, 0x1}}, [0x7ff, 0x8, 0x3, 0x85c, 0x0, 0x9, 0x7ff, 0x7ff, 0x1, 0x20, 0x2, 0x9, 0x1, 0x40, 0x5]}, &(0x7f0000002200)=0x100) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000002580)={0x0, 0x8}, &(0x7f00000025c0)=0x8) sendmmsg$inet_sctp(r4, &(0x7f0000002680)=[{&(0x7f0000000580)=@in6={0xa, 0x4e24, 0xa0, @loopback}, 0x1c, &(0x7f0000002040)=[{&(0x7f0000000600)="0443624ef246b6d557c106572431c8f0bea1b202754ee52f6dcc9646e56dc7f443d27508fc40db020ca48cc884c548441918c4ab5c4d584cd9646a3f8529027870ef1591537461108f30786f4ff55930c0b63e98aeb532c09cc46b53e41f4cb33e96ed8842c94a27d1845b9722ddf706924eae493ecc63c5f02228fdb37d45e866c5e2c0b7202cb807c960229d6ecfb5257b59e6c6e536f67c62abbbc74af812bc1a79d823f5d1d1c08383b25abc1a", 0xaf}, {&(0x7f00000019c0)="7a68b23e5ef53ba96772b7dbe9f158f210f98f5e864c701d910f9dd49825ff07527430747f40ff279fd2526d9ca761b3745ef7a47b85014feeebca8fe42755268b8f49cd7dc3775a6f2c4dd77cd8c52fd2a226c0491db708b32376aa19c0502882d6033d0877e608319131fb20dbdc99e255ac6f7da4a91f1f700fae96788fd0768252cc8c48030e4e", 0x89}, {&(0x7f0000001800)="97a83eea3cba11e49116940bfd2c8928bb5f2fc336e0", 0x16}, {&(0x7f0000001a80)="ba282f2adba66837840cf934232ae7a1095e1bb171cba9756e7e47c3411c671b8dd4c53ae114b1291a9e61d25ec0de82bc7c", 0x32}, {&(0x7f0000001ac0)="7a342c3c2b92f75c1969951cc6c774050ed49a7e6516a48de6605a745bb67ca0205f830c6c56e26b04a0f14e3d80cf01e77c1a5200566dc0ec1560d58441d5ad693ec052d0b2a31c35797bc1f9262289e17f1e3012610543cfe56927f5a79b61ac599c25c7f7c2399fa579249c1bafd90e3e86aaf1c9abfd9b7775d30e46495716ddf6e860b6f6fb26a8fa011f14cb77e24a91032683524f19f5b8b1ddb09a6bb402941376c8db5b1f8a5909e9028547f9cf513cfd8bd43473a14a79302f7123a8b5111758558364c3e51896c02c567dd41ed8c0a392112826c85a8a7b2e874e0d6f59f626befba9710f160ed5f46196de", 0xf1}, {&(0x7f0000001bc0)="40f34fbf81f8692831608dbea65cf64332620c2fab192b5b20e673461b7dac9c2c41234bd07b79254c3e37c4fa67045a35a3af53421820f739c60961c06d13c2a359df24354ec7c2d39817f2dfde83ada1af9fac8c4fda51f7ad3f892baf272617b3725b3d6132828a5a48c0f8b03543ac6c47cc2805dbe58aa06363aca46b594041d0e62e717639a720cd0a96293f09346b315d3cf96db17c76b9003300ce4fdb71b0865aacf56b1fb123684c7b70910a78f782c39836b7d8", 0xb9}, {&(0x7f0000001e80)="d951aaf5c6ea26d2ff9a105b58d8ed4fd6ddf6a663881b1e01f164c1d49f5cbefa248ed6462bf8aa250d02d09e744fcd28eedf29e8266914662e3f4092acbfb84a2e4b35900814a819efb4c02ef5647045740b2d89b675a28c0d416d3780b182d43e04352e6e1c1e133d30c0671e12fc6ed7dcdc5f622135cf0336a254771ade2c32ec105469c6da3be4227e12ea38d50a36db9109669bfc8b50dc9c870d792ca409f9210f740e608a0e0c5684b89fbabd57eb52b90f0f8cc4d27df849fe605694922f9a5a51f92d2c8279379c074184c230b1d8b022acd4871fbfb4b97722b487b17b405fa12b1e729ccff1f2", 0xed}, {&(0x7f0000001c80)="3ff3529f017e8de500d56eef91423b04e86aac82f310bbc6672dc02b5f74df2e467676", 0x23}, {&(0x7f0000001f80)="23c67879beac7608b1fb8e5d88e76f0e86b69577c473081df7729bf10def8d3d271e521f0f22e46aec3217b9f105ac3b75830a1ee01cf02d1873bbde41c1fe6b63333272f99ec2b33c5d3f96b109b95eebe943d787729da8a35938e6555d8bb1d3e0032cd3f0ecbd9be71b47977f6f708b48fd298eb2d0dbc6284d862912cf501338ea52f2f8727481", 0x89}], 0x9, &(0x7f0000002240)=[@init={0x18, 0x84, 0x0, {0x6, 0x9, 0xef, 0x10001}}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0x6, 0x0, 0x400, 0x3, 0x5, 0x3ff, 0x514e, r7}}, @init={0x18, 0x84, 0x0, {0xfffffffffffffffd, 0x8000000000000000, 0x401, 0x200}}], 0x60, 0x4000000}, {&(0x7f00000022c0)=@in={0x2, 0x4e24, @local}, 0x10, &(0x7f0000002540)=[{&(0x7f0000002300)="9e7ec7bd9c88835cf8ed05fc72653c8ac3d5fa7080a5d885f1773c69205e9094105698bcb91ae3f82c279f1221edd6e4c68a74d679d2fbfbb32a3763b08eae96a15e8dd07c9aa139b7f6a976d24b50f36d921447537ab6122ae33ee04d42525eef8da9aa42cf", 0x66}, {&(0x7f0000002380)="2069ca8c9d367a7338cd67fbbbcc8cd332ffeb69a1c6fd0d0b8c2c6d91fd5fd8c67aa3727f3eec98a6beb9d37961009e9dc42ba1f7aa3097c6e5b909aae8680866457aaf520d489bbb848a80d95f91f771f7a36cddeff89af9a00dc65d7fc0de5f7ff41b930de55c1ec50a4267ef24c35639371d710e0dbba35a093e0c396a2566dc6c362d78a061683bd7c191cfebb6dc8def445b28ab916fc31dac23188a11639f1ca278096c018f8bb64adaafa1ae17fc28e0dc526fa27dc7001cbb1b5b900f57595a4e77044fef985aba247d172b9f213dd5d52933245c3b7d8fd7bde43f", 0xe0}, {&(0x7f0000002480)="00583208cf87b4eb5b2e6d823de3ca9a638fe7370eb42a93b6c405fe105371f0b029087aac76b6bb7993e23dcf3213613c001e4ce21c27e9ed54e2e982c9ab0de87e6de786a859b8b18935b7d98e31a8e16a7ef923039ad64eb1d44109dc968f6222ba05ee31b44bf7144f24af54e0f87854bb0f3a71add9bc112140b446538af03d47f18ba458bdfdc5ab372e2b4d45944d6e5db7c3382e5cb641ba6bf6ae3281f77441c2da52b2f8", 0xa9}], 0x3, &(0x7f0000002600)=[@dstaddrv6={0x20}, @sndinfo={0x20, 0x84, 0x2, {0x4, 0x8, 0x47, 0x8b00000000, r8}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x100000000000}], 0x58, 0x40}], 0x2, 0x0) 09:28:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x7ffff000, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xea01, 0xd, &(0x7f0000000080)=""/254) 09:28:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x100000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1f000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x97ffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3001, 0xd, &(0x7f0000000080)=""/254) 09:28:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x5e, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 728.955013] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 728.994507] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:49 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500d0000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:49 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x301000000000000, 0xd, &(0x7f0000000080)=""/254) [ 729.035598] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0xf, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x8cffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xf0000000, 0xd, &(0x7f0000000080)=""/254) 09:28:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0xfffffdef, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1f00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4c00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x2000001c, 0x32, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7a00, 0xd, &(0x7f0000000080)=""/254) 09:28:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1f000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x74, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:50 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) pwritev(r0, &(0x7f0000001f80)=[{&(0x7f0000000600)="17bb1b3f18e0af2f0ad795edd4d71a57a4ab5ca5b2b2011b6e115297944ede68e3de07bd52704df48b73296625b3b092ac6fd8033330cef6a76e4bca0cd68ad791846201d26ec6942dd9d5421e3b14438ade95b25ac8b99d468a6b16079d21ad2181135ecccde103c56c84315ce101cfc1626a9ff46249015e25234749e458c3939544032fca88afa7dc9b0e8e0e4cbc32", 0x91}, {&(0x7f0000001c80)="4df71b0fc350b985b9fa8674f2bee2a57655eab36ba4775665ff5ffb2b3bae03aabfa5ab7923031ead96a6b8ec60b4996d0001442e7a5475f32f85f876a8e2abd476f3aa60ff40d51cf07f9eb6b2dc1545c67bd0806124b25fff5144b0f54c0c3699e869cbec49d371109c298c3f724820958f355724c673d82955bef2687e202a833322e737e27e9f69200838bf9948", 0x90}, {&(0x7f0000000580)="ae4c6b6624f688d245fc0e4acd4eeacff9a8f76f019e40", 0x17}, {&(0x7f0000001d40)="6b62c1046b78e799cad6d68161e8a51d476f271806f8f3a177badabfb934a6bc773a90058cce3d31e6a5b9e2ca97f7c102870167372634ee5c84deb3d5aff7da7dd3627719e405ada27a2a5f2a939368ad501dc704136eadc0eb4f18e7e64c0c71e5abfbac7b36a49968edb729cd91d87c75d6c8f76953f681f5f8c7f9674e2fedafaaffcfec47ddba61dfd4cf3fca", 0x8f}, {&(0x7f0000001e00)="2bddd89de1ac240ab3fce66084f7c1f9d26421fa085e1a4069b0a4506df994078fa78581322627860619ca2ae71c048294ee79d81fa9d507efd7d65fc2e33417af755b86de62cdab99f788384e60815d03660615f0cdea8eb36c9875fdd2dbe36d84c8f4dc4087baf61352881e0c8d91584313309022ecda6d98f9d1f78c8bc2b0f42dcb52c893531ca2c8f2ff6139868808c83503ca36658eb2da10d852181dec4206a83c4e837e3908c0337ad6c8c0da71b42cb1a718c2aa9264675b67b2800693450f8b74f86c8700ea022518caae228b8e9840488203098b2c2a712ba1243f74b54ac2c010b06f8bd9d7ef12ebda41a3a9fa", 0xf4}, {&(0x7f0000001f00)="b252d9c8c829b19a8ca40d49d04b6c0102aac42d92d25ff9d023f6658744be483299c149a3925db75246ca8031be58189ffa633718422bdc397de49139ecd69d7eec0578c55522ca082d5394245143adf3b5857d8f4c2398ce84b0779fb559b6429ec97d80aef6432c327959b175f00ebfaba4eb362cafaff129", 0x7a}], 0x6, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000540)=0x800) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x84, &(0x7f0000002000)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r3, 0x40049409, r6) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x8) memfd_create(&(0x7f0000001b80)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e", 0x6) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x146, 0xd, &(0x7f0000000080)=""/254) 09:28:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x5e, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0xa, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2001000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6c00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0xf, 0x829, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5b00000000000000, 0xd, &(0x7f0000000080)=""/254) [ 730.179453] device nr0 entered promiscuous mode 09:28:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x85e, 0x0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfdfdffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:50 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6701000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x6c000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:51 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6400000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xf6ffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 731.000560] __nla_parse: 10 callbacks suppressed [ 731.000571] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x300000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:51 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xee010000, 0xd, &(0x7f0000000080)=""/254) 09:28:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x68000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 731.133289] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xd50, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfdffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfdfdffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:51 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1ee, 0xd, &(0x7f0000000080)=""/254) 09:28:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xffffff9e, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 731.223252] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:51 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xf801000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfc, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 731.331445] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffff97, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x7a, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6c000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x17010000, 0xd, &(0x7f0000000080)=""/254) 09:28:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x4c00000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 731.479624] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 731.489009] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xe400000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfc, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3f00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 731.611097] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x4c000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xd301000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6c000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x200000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x100000000000000, 0xd, &(0x7f0000000080)=""/254) [ 731.784943] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x97ffffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x13c, 0xd, &(0x7f0000000080)=""/254) 09:28:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6c000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 731.931845] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x400000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xbf, 0xd, &(0x7f0000000080)=""/254) 09:28:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x308) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r2, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r5, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r1, 0x40049409, r4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) [ 732.085873] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4c000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1e5, 0xd, &(0x7f0000000080)=""/254) 09:28:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xf0ffffff, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffdfc, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x500, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x500, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:52 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xe9, 0xd, &(0x7f0000000080)=""/254) 09:28:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x600, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x8701000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x300, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffff6, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x60000000, 0xd, &(0x7f0000000080)=""/254) 09:28:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x1000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x10, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xf, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xcf010000, 0xd, &(0x7f0000000080)=""/254) 09:28:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xf0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x10000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = syz_open_dev$vcsn(&(0x7f0000000540)='/dev/vcs#\x00', 0x0, 0x80) write$P9_RFLUSH(r2, &(0x7f0000000580)={0x7, 0x6d, 0x2}, 0x7) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r4, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x0, 0x0, 0x4000000000000, 0x0, 0x0, r4}, 0xfffffffffffffd1a) sendmsg$key(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r7, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r3, 0x40049409, r6) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000600)={0x6, 0x2, 0x8, 'queue0\x00', 0x4}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) [ 732.612214] EXT4-fs: 61 callbacks suppressed [ 732.612226] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 732.703046] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3301, 0xd, &(0x7f0000000080)=""/254) 09:28:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x48, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 732.763139] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 732.800007] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xa010000, 0xd, &(0x7f0000000080)=""/254) [ 732.827821] device nr0 entered promiscuous mode 09:28:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffff8c, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 732.868384] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x6c00000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffd, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5501, 0xd, &(0x7f0000000080)=""/254) 09:28:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x68, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 733.016697] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:53 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2f, 0xd, &(0x7f0000000080)=""/254) [ 733.061987] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 733.081937] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 733.103320] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x3f000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 733.212281] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffff8c, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x300000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4100000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2d, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x3000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4c00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xaf00000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x9effffff, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfdffffff00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x200000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffff7f00000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x300, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xfdfdffff, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x48000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x6800, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x23, 0xd, &(0x7f0000000080)=""/254) 09:28:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x3f00, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x108, 0xd, &(0x7f0000000080)=""/254) 09:28:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xffffff7f, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x40000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4800, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x4c, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x74, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0xffffffffffffff2d, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xffffffffffffff7f) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r5, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) socketpair$unix(0x1, 0x400000000000000, 0x0, &(0x7f0000000000)) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x53, &(0x7f0000000080)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r6 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r6, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000200)) creat(&(0x7f0000000340)='./bus\x00', 0x40000000000000) 09:28:54 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4500000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7400, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x6000000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x54010000, 0xd, &(0x7f0000000080)=""/254) 09:28:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6c00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x400000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x34000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 734.504250] device nr0 entered promiscuous mode 09:28:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2d00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:55 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x102, 0xd, &(0x7f0000000080)=""/254) 09:28:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x3f00000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) sendmsg$nl_route(r3, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0xa0000}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)=@mpls_newroute={0x1c, 0x18, 0x400, 0x70bd2c, 0x25dfdbfc, {0x1c, 0x14, 0x14, 0x9, 0x0, 0x1, 0x0, 0xb, 0x2000}}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7400, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xfffff000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xc000000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2d00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x74000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x8c000000, 0xd, &(0x7f0000000080)=""/254) 09:28:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xffffff7f00000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x6, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x700000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:56 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xfd00, 0xd, &(0x7f0000000080)=""/254) [ 735.758934] device nr0 entered promiscuous mode 09:28:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x7, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1c00, 0xd, &(0x7f0000000080)=""/254) 09:28:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7400000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x68000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 736.635307] __nla_parse: 29 callbacks suppressed [ 736.635317] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5200, 0xd, &(0x7f0000000080)=""/254) 09:28:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x6c00, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6800, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:57 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5d010000, 0xd, &(0x7f0000000080)=""/254) 09:28:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xa000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 736.800220] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xdb010000, 0xd, &(0x7f0000000080)=""/254) [ 736.851017] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2d00000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=""/33, 0x21, 0x2001}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507001900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x300000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:57 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x36010000, 0xd, &(0x7f0000000080)=""/254) 09:28:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x20000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 737.048053] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x5f0b0000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7a, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 737.182118] device nr0 entered promiscuous mode [ 737.195560] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6c000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x60000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 737.257699] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x10000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 737.377693] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6800, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xf000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 737.515879] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 737.528949] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:28:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:28:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x4c00, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7a, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xffffffff00000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x3300, 0xd, &(0x7f0000000080)=""/254) 09:28:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6c01, 0xd, &(0x7f0000000080)=""/254) [ 738.083633] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 738.119154] EXT4-fs: 57 callbacks suppressed [ 738.119166] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x4800, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 738.174206] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 738.201593] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1f000000, 0xd, &(0x7f0000000080)=""/254) [ 738.241078] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 738.285395] device nr0 entered promiscuous mode 09:28:58 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4800000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:58 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1001, 0xd, &(0x7f0000000080)=""/254) [ 738.505830] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 738.517204] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 738.573375] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 738.587079] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="65787432fd", &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x7400, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x8700, 0xd, &(0x7f0000000080)=""/254) 09:28:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x48000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x400000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:28:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x105, 0xd, &(0x7f0000000080)=""/254) [ 739.163600] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x5, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:28:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x6c00000000000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 739.213761] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:28:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6901000000000000, 0xd, &(0x7f0000000080)=""/254) 09:28:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xf00000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x3, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4000000000000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000540)={0xfffffffffffffc01}) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000019c0)=ANY=[@ANYBLOB="020c06080b00002028bd7000fddbdf2507401900000000000a004e2407000000fe8000000000000000000000000000100200000002004c20ac1414bb00000000000000000000000002001000000004d5000004d20000000093f4647018ec1f0aafa0b6c5a307f61699cb51ce87d4a7a9dbe32f512c38d8789533f50a36d28a895a8ada9ec254ee696657d0b465c0e243de9dfecb3a98e2cbb06397bd6f8152c3aabb710c3b7beb16282f3374fa7b2561ecbea9b757b9df405274ebef3b6f56036129f3b4e8f7a570575447e2971dd4d8c0511e99cd0c849eb598efe136f59818e2f6597e40cbdcbd125d332d1dacb65d5798ffc1edb031e56b3c40638fbbd6d1f9571409bb5c28b9a7348a188af21df53d19bdd80f77b9351a8068b63a185f96cabbed55619e1a0bfbe610e73e913db643978b4637bed164c89b90e3a73fa893b18ae7092633c710ab27a27c0d3580fd712b78c335991e787877b6537c8835d1ee5ba188aeb64861403cc342f49140b6fb63e8012ee0d1954b3647cd25ad355642be7dab8a9256486a68f041230ffe52424548678caefa281093f78667ab0f3132e3d68be13e8f188a609d5a8b64df731f7c071d77c93943dc625deafd61219b4df0f1227f36af2dce7d92a565d51cf21a74503453b5aabd6ed50d4b228e47f466b18fdd5ee7b179064acc09f10fc545dfb386eb69a385e730606ed48746580f53aed20391a46c1f22f857611d584cfdbc9e0a43d31cacc77103a7f9ca0a4e4f5808a629fe3663a54f3ea7b9907aad6558e7117c82d00a22e4dbe277d171c000ac103191072dc5da12918e372d6a9eaf989543162663c473ed2b00bac6"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:29:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2201000000000000, 0xd, &(0x7f0000000080)=""/254) 09:29:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6c000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xf0ffffff00000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1d000000, 0xd, &(0x7f0000000080)=""/254) 09:29:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x7000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x1000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xf400000000000000, 0xd, &(0x7f0000000080)=""/254) [ 739.649103] device nr0 entered promiscuous mode 09:29:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x700, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xf6ffffff00000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:00 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xad00, 0xd, &(0x7f0000000080)=""/254) 09:29:01 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x3, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4000000000000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000540)={0xfffffffffffffc01}) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:29:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x5000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x600, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1400000000000000, 0xd, &(0x7f0000000080)=""/254) 09:29:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x500, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3f00000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x4, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xbd00, 0xd, &(0x7f0000000080)=""/254) 09:29:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x2d000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x700000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:01 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x9701, 0xd, &(0x7f0000000080)=""/254) [ 740.661267] device nr0 entered promiscuous mode 09:29:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7400, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) fcntl$addseals(r1, 0x409, 0x4) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:29:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x8cffffff, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x7400000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:02 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7, 0xd, &(0x7f0000000080)=""/254) 09:29:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x3f000000, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:02 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xba010000, 0xd, &(0x7f0000000080)=""/254) 09:29:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xfcffffff00000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:02 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1f010000, 0xd, &(0x7f0000000080)=""/254) 09:29:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0xa00, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xffffff7f, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 741.643347] device nr0 entered promiscuous mode 09:29:02 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4301, 0xd, &(0x7f0000000080)=""/254) [ 741.720124] __nla_parse: 14 callbacks suppressed [ 741.720139] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:29:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:03 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xa700000000000000, 0xd, &(0x7f0000000080)=""/254) 09:29:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x5f0b, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:03 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5200000000000000, 0xd, &(0x7f0000000080)=""/254) [ 742.437242] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:29:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x74, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6c, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 742.569259] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:29:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)="6e7230010060a19ef9d2c673d9a1571cb9e1369bcd61ef7e49793ae18712eceb1daa769497800b7fbbd35b170c10751d39aeb660d863e49b8c4f3b3cad48902b5b2d6cfd0abd372c63bcf5d70df3fd4d2e8d443c88c60fd7140fbc0e5637dd82fc3435bed4de5d693c9a781c863e05d8a6f8689a5be29216061f3ff53f8b6b396678e7ba155ef9152d7e43b1eccb2331eb8eb1ed5586dcf8b3b0b999361a44ff2c22c2abbef42dd24eabe6723346a6e46c0499a21442d8d00dcb57f013ff7595edd0ff076930de3675d34117a44eb0e4f832936da44e") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000540)='trusted.overlay.redirect\x00', &(0x7f0000000580)='./file0\x00', 0x8, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={"6e72300100", 0x801}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x308) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000280)=0x40) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000600)) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000001e80)={"619cd6b527c5a0dc961d74a98cf2855949d6a8ca867eaca58e6aedcb0dbda311d73ad9352a38e30af1c878007ebf86893739b05c358da5bb472ce3d16433f6537ad39fede3691b54b3dc3ead3f6a13148f08d3e388ee25d355094796be75c545f3acdb13898b9abbc6bde79f2dd65b56751224b33fcf76e5f4a1c2ab1bb5f1d7f695680f8c5863de57cde1d324cabcdcd2dc4ac5327e81bfd6485d66ddf39144c1ed1c7be5f854555e6bb6896ccb720d3bf5d872fb59230e8511ede201430dc97fa77f8b82c1f6cd9b09811e1b2662a5fe3d39a7bfa118dc9f165530d6448e70bd8181651264f6ddd30df5268df946201c56cf80feded6dc87e51d980123e7964df0b6147c2249e329cbf81b6fae0429cf85b931fb331ad3a42c2c7f1926eb39824e6ecd58163057dd8ec4253fd71093bb5b63c8f3ee088456327dc858c3ab6e12e9ef5d86ef0248f3b8fe8d9111ea0f3814c8180da6337c7fdd9753ec3afaa64500858d13e2715ccaf823cb74eb996786a1730685939d8157ad2a229abbc8aafb8f67dd5a079cac5b2df18c606ab67fbcf8a46cd9f60fb12a31e7595a18e02e3c66b63833ced1c9258bbd542f74f5603bec7bc3ba4099967f097950de850d51e60e81c118242d30a4ca9cd53d2247a22eb2083926dc783bd2325b4fa30725821bc37a6cc5b4c9013ab7cd7a45ace939929649edae087abbcf631f1166b14b5a994b899b6908fa92f469057b24f3c1865efdfd01f653c182533c7e63568d23e32f467fa60d253a1490040c057a7fa3349a3f8518a54b92ad129b20988d2b89fc225a21f5baf05c2c2c6b46b1ff879c2052cdfc19d791a1d1f941c1650814454bab0fc9f0dead83ca99f48623467193437cedcb0c0bc08800c7b7c4308918fc71a15fd69d3e699e8f4acfada9e2214500e3abec9c6b00c2e3d83efe56bf56be30535ce588d6f44ac38e68de27c36e2c70370f493f2658a127d36c217ccaf5b9e90c16ff054e55fc605466a8a6263adb82640ac2c0918e0a22d26675b78a2ff93e3897c2949289bad008b405801960e3f85f6689aceb4774a049971dab6dd6f1aa26af112ee5035ed82685ed8bdcd8be875071bd85f58d167fa3e24c07be31bc412ddd887fc2ed215d8bd55b9a8ab832222169ed3e472601d92ae534e24a09f061b51ca4987d9c2966bb07c2ad91d34ca553f2da20d390cce3124a0348d5e61eea1109e1783c2074ca9cf25d30140c3e15d06540c523f98128f7c673a04931ab1692eaba23233b17658e8bdd030899abb7cd0527ca8b47eef5c1c797056c8e8f57ead309738c6e48b69cd6cc9068a965f6441c74f32e0a71c9a125bbca61be147171bc9c5c2298b56b1ff6389668645c3f8a801d8599ecd7530d7f894362efe4d612cbe71dc82e3b654fc3f3d52240aeb636dd039b8ba13ae401ef0d6098fa8e20"}) recvmsg$kcm(r1, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000005c0)=""/9, 0x9}, {&(0x7f00000006c0)=""/229, 0xe5}, {&(0x7f00000007c0)=""/4096, 0x1000}], 0x3, &(0x7f0000001840)=""/33, 0x21, 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_dccp_int(r3, 0x21, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x4) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) getsockopt$inet_dccp_buf(r3, 0x21, 0x8d, &(0x7f00000018c0)=""/216, &(0x7f00000004c0)=0xd8) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='memory.stat\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500), 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000400), 0x2c) sendmsg$key(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x1b4}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200000080}, 0x2c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000480)={0x7, 0x0, 0x80000001}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r6, &(0x7f0000000300), &(0x7f0000000280)}, 0x20) ioctl$FICLONE(r2, 0x40049409, r5) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000380)={0xffffffffffffffff, 0x3, 0x1, 0x0, &(0x7f0000000340)=[0x0], 0x1}, 0x20) 09:29:03 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x68000000, 0xd, &(0x7f0000000080)=""/254) 09:29:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6800, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2d00, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xf0ffffffffffff, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:03 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xe801, 0xd, &(0x7f0000000080)=""/254) [ 742.755571] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 742.820391] device nr0 entered promiscuous mode 09:29:03 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xc6, 0xd, &(0x7f0000000080)=""/254) 09:29:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x6800000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfffffffd, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:03 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x10, 0xd, &(0x7f0000000080)=""/254) [ 742.976941] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 743.145389] EXT4-fs: 37 callbacks suppressed [ 743.145401] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 743.167522] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 743.205555] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:29:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2d00000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x6000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:04 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1501, 0xd, &(0x7f0000000080)=""/254) 09:29:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfdffffff00000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7a, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:04 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x31000000, 0xd, &(0x7f0000000080)=""/254) [ 743.689797] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 743.723796] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:29:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x400300, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 743.760792] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 743.792980] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 743.801794] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:29:04 executing program 0 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) [ 743.816181] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 743.847649] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:29:04 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x8f00000000000000, 0xd, &(0x7f0000000080)=""/254) 09:29:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x60, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6c000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 743.955392] FAULT_INJECTION: forcing a failure. [ 743.955392] name failslab, interval 1, probability 0, space 0, times 0 [ 743.995344] CPU: 0 PID: 10747 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 09:29:04 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7b000000, 0xd, &(0x7f0000000080)=""/254) [ 744.003891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.013255] Call Trace: [ 744.015875] dump_stack+0x244/0x3ab [ 744.019526] ? dump_stack_print_info.cold.2+0x52/0x52 [ 744.024734] ? debug_smp_processor_id+0x1c/0x20 [ 744.029625] ? perf_trace_lock+0x14d/0x7a0 [ 744.033886] should_fail.cold.4+0xa/0x17 [ 744.037959] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 744.043064] ? lock_is_held_type+0x210/0x210 [ 744.047490] ? __f_unlock_pos+0x19/0x20 [ 744.051480] ? lock_downgrade+0x900/0x900 [ 744.055640] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 744.061185] ? proc_fail_nth_write+0x9e/0x210 [ 744.065691] ? kasan_check_read+0x11/0x20 [ 744.069850] ? lock_is_held_type+0x210/0x210 [ 744.074275] ? fs_reclaim_acquire+0x20/0x20 [ 744.078600] ? lock_downgrade+0x900/0x900 [ 744.082757] ? wait_for_completion+0x8a0/0x8a0 [ 744.087346] ? perf_trace_sched_process_exec+0x860/0x860 [ 744.092814] ? fsnotify+0xf10/0xf10 [ 744.096447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.102082] __should_failslab+0x124/0x180 [ 744.106331] should_failslab+0x9/0x14 [ 744.110140] __kmalloc+0x2e0/0x760 [ 744.113684] ? strncpy_from_user+0x5a0/0x5a0 [ 744.118092] ? fput+0x130/0x1a0 [ 744.121382] ? __x64_sys_memfd_create+0x142/0x4f0 [ 744.126229] __x64_sys_memfd_create+0x142/0x4f0 [ 744.130900] ? memfd_fcntl+0x18b0/0x18b0 [ 744.134994] do_syscall_64+0x1b9/0x820 [ 744.138891] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 744.144256] ? syscall_return_slowpath+0x5e0/0x5e0 [ 744.149185] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 744.154054] ? trace_hardirqs_on_caller+0x310/0x310 [ 744.159072] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 744.164090] ? prepare_exit_to_usermode+0x291/0x3b0 [ 744.169207] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 744.174056] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 744.179262] RIP: 0033:0x457519 [ 744.182463] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:29:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4000000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:04 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x4900, 0xd, &(0x7f0000000080)=""/254) 09:29:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x100000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 744.201367] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 744.209085] RAX: ffffffffffffffda RBX: 00000000200024c0 RCX: 0000000000457519 [ 744.216364] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 744.223638] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 744.230912] R10: 00000000200024c0 R11: 0000000000000246 R12: 00007ff511a286d4 [ 744.238188] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 09:29:04 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xb201, 0xd, &(0x7f0000000080)=""/254) [ 744.263566] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 744.335001] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:29:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xfffffffc, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 744.406442] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:29:05 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7a01, 0xd, &(0x7f0000000080)=""/254) 09:29:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xffffff7f, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:05 executing program 0 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) [ 744.454625] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:29:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x4800000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xffffff7f00000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7a000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:05 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7a, 0xd, &(0x7f0000000080)=""/254) 09:29:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xf0ffff, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 744.580137] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 744.646483] FAULT_INJECTION: forcing a failure. [ 744.646483] name failslab, interval 1, probability 0, space 0, times 0 [ 744.730038] CPU: 0 PID: 10796 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 744.738578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.747945] Call Trace: [ 744.750549] dump_stack+0x244/0x3ab [ 744.754199] ? dump_stack_print_info.cold.2+0x52/0x52 [ 744.759410] ? debug_smp_processor_id+0x1c/0x20 [ 744.764095] ? perf_trace_lock+0x14d/0x7a0 [ 744.768352] should_fail.cold.4+0xa/0x17 [ 744.772430] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 744.777546] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 744.782572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.788124] ? perf_trace_lock+0x14d/0x7a0 [ 744.792369] ? lock_downgrade+0x900/0x900 [ 744.792389] ? lock_is_held_type+0x210/0x210 [ 744.801013] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 744.805949] ? lock_is_held_type+0x210/0x210 [ 744.805969] ? fs_reclaim_acquire+0x20/0x20 [ 744.805981] ? lock_downgrade+0x900/0x900 [ 744.806001] ? expand_files.part.8+0x571/0x9a0 [ 744.823418] ? perf_trace_sched_process_exec+0x860/0x860 [ 744.828883] ? iterate_fd+0x4b0/0x4b0 [ 744.832697] __should_failslab+0x124/0x180 [ 744.836939] should_failslab+0x9/0x14 [ 744.840744] kmem_cache_alloc+0x2be/0x730 [ 744.844904] ? shmem_destroy_callback+0xc0/0xc0 [ 744.849582] shmem_alloc_inode+0x1b/0x40 [ 744.853649] alloc_inode+0x63/0x190 [ 744.857284] new_inode_pseudo+0x71/0x1a0 [ 744.861353] ? prune_icache_sb+0x1c0/0x1c0 [ 744.865601] ? _raw_spin_unlock+0x2c/0x50 [ 744.869758] new_inode+0x1c/0x40 [ 744.873142] shmem_get_inode+0xf1/0x920 [ 744.877126] ? shmem_encode_fh+0x340/0x340 [ 744.881368] ? lock_downgrade+0x900/0x900 [ 744.885529] ? lock_release+0xa10/0xa10 [ 744.889506] ? perf_trace_sched_process_exec+0x860/0x860 [ 744.894965] ? usercopy_warn+0x110/0x110 [ 744.899041] __shmem_file_setup.part.50+0x83/0x2a0 [ 744.904005] shmem_file_setup+0x65/0x90 [ 744.907991] __x64_sys_memfd_create+0x2af/0x4f0 [ 744.912668] ? memfd_fcntl+0x18b0/0x18b0 [ 744.916742] do_syscall_64+0x1b9/0x820 [ 744.920638] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 744.926012] ? syscall_return_slowpath+0x5e0/0x5e0 [ 744.930947] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 744.935809] ? trace_hardirqs_on_caller+0x310/0x310 [ 744.940839] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 744.945867] ? prepare_exit_to_usermode+0x291/0x3b0 [ 744.950895] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 744.955754] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 744.960957] RIP: 0033:0x457519 09:29:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3f00, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:05 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xb4010000, 0xd, &(0x7f0000000080)=""/254) 09:29:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x20000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 744.964154] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 744.983061] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 744.990793] RAX: ffffffffffffffda RBX: 00000000200024c0 RCX: 0000000000457519 [ 744.998072] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 745.005349] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 745.012620] R10: 00000000200024c0 R11: 0000000000000246 R12: 00007ff511a286d4 [ 745.012630] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 09:29:05 executing program 0 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:05 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xcd000000, 0xd, &(0x7f0000000080)=""/254) 09:29:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x2000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 745.184580] FAULT_INJECTION: forcing a failure. [ 745.184580] name failslab, interval 1, probability 0, space 0, times 0 [ 745.241685] CPU: 0 PID: 10835 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 745.250257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.259620] Call Trace: [ 745.262228] dump_stack+0x244/0x3ab [ 745.265882] ? dump_stack_print_info.cold.2+0x52/0x52 [ 745.271088] ? debug_smp_processor_id+0x1c/0x20 [ 745.271109] ? perf_trace_lock+0x14d/0x7a0 [ 745.280046] should_fail.cold.4+0xa/0x17 [ 745.280063] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 745.289215] ? check_preemption_disabled+0x48/0x200 [ 745.294253] ? perf_trace_lock+0x14d/0x7a0 [ 745.298501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.304061] ? check_preemption_disabled+0x48/0x200 [ 745.309874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.315418] ? lock_is_held_type+0x210/0x210 [ 745.315433] ? debug_smp_processor_id+0x1c/0x20 [ 745.315449] ? perf_trace_lock+0x14d/0x7a0 [ 745.324508] ? debug_smp_processor_id+0x1c/0x20 [ 745.324530] ? lock_is_held_type+0x210/0x210 [ 745.324552] ? fs_reclaim_acquire+0x20/0x20 09:29:05 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x6501, 0xd, &(0x7f0000000080)=""/254) 09:29:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1f000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 745.342162] ? lock_downgrade+0x900/0x900 [ 745.346322] ? perf_trace_sched_process_exec+0x860/0x860 [ 745.351798] __should_failslab+0x124/0x180 [ 745.351816] should_failslab+0x9/0x14 [ 745.359837] kmem_cache_alloc+0x2be/0x730 [ 745.359851] ? mpol_shared_policy_init+0x235/0x650 [ 745.359868] ? current_time+0x72/0x1b0 [ 745.372811] __d_alloc+0xc8/0xb90 [ 745.376282] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 745.381314] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 745.386333] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 745.391519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.397047] ? timespec64_trunc+0xea/0x180 [ 745.401308] ? inode_init_owner+0x340/0x340 [ 745.405624] ? _raw_spin_unlock+0x2c/0x50 [ 745.409790] ? current_time+0x10b/0x1b0 [ 745.413766] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.419323] ? check_preemption_disabled+0x48/0x200 [ 745.424343] ? __lockdep_init_map+0x105/0x590 [ 745.428856] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 745.434396] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 745.439971] d_alloc_pseudo+0x1d/0x30 [ 745.443779] alloc_file_pseudo+0x158/0x3f0 [ 745.448004] ? alloc_file+0x4d0/0x4d0 [ 745.451801] ? usercopy_warn+0x110/0x110 [ 745.455862] __shmem_file_setup.part.50+0x110/0x2a0 [ 745.460872] shmem_file_setup+0x65/0x90 [ 745.464837] __x64_sys_memfd_create+0x2af/0x4f0 [ 745.469497] ? memfd_fcntl+0x18b0/0x18b0 [ 745.473556] do_syscall_64+0x1b9/0x820 [ 745.477445] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 745.482812] ? syscall_return_slowpath+0x5e0/0x5e0 [ 745.487732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 745.492582] ? trace_hardirqs_on_caller+0x310/0x310 [ 745.497608] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 745.504050] ? prepare_exit_to_usermode+0x291/0x3b0 [ 745.509091] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 745.513931] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.519114] RIP: 0033:0x457519 [ 745.522300] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:29:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x4000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 745.541192] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 745.548893] RAX: ffffffffffffffda RBX: 00000000200024c0 RCX: 0000000000457519 [ 745.556153] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 745.563416] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 745.570675] R10: 00000000200024c0 R11: 0000000000000246 R12: 00007ff511a286d4 [ 745.577931] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 09:29:06 executing program 0 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7d01000000000000, 0xd, &(0x7f0000000080)=""/254) 09:29:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xd50, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xfcffffff, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6c00, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 745.708703] FAULT_INJECTION: forcing a failure. [ 745.708703] name failslab, interval 1, probability 0, space 0, times 0 [ 745.774332] CPU: 0 PID: 10865 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 745.782874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.782881] Call Trace: [ 745.782903] dump_stack+0x244/0x3ab [ 745.782924] ? dump_stack_print_info.cold.2+0x52/0x52 [ 745.794867] ? debug_smp_processor_id+0x1c/0x20 [ 745.808333] ? perf_trace_lock+0x14d/0x7a0 [ 745.812582] should_fail.cold.4+0xa/0x17 [ 745.816665] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 745.821778] ? save_stack+0x43/0xd0 [ 745.821791] ? kasan_kmalloc+0xc7/0xe0 [ 745.821804] ? kasan_slab_alloc+0x12/0x20 [ 745.821823] ? lock_is_held_type+0x210/0x210 [ 745.837873] ? mark_held_locks+0x130/0x130 [ 745.842127] ? memcg_kmem_put_cache+0x1d1/0x300 [ 745.846819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.852371] ? lock_is_held_type+0x210/0x210 [ 745.856793] ? fs_reclaim_acquire+0x20/0x20 [ 745.856810] ? lock_downgrade+0x900/0x900 [ 745.856829] ? perf_trace_sched_process_exec+0x860/0x860 [ 745.856845] ? lock_downgrade+0x900/0x900 [ 745.874910] __should_failslab+0x124/0x180 [ 745.879157] should_failslab+0x9/0x14 [ 745.882967] kmem_cache_alloc+0x2be/0x730 [ 745.882989] ? d_set_d_op+0x31d/0x410 [ 745.883009] __alloc_file+0xa8/0x470 [ 745.883026] ? lock_is_held_type+0x210/0x210 [ 745.899066] ? file_free_rcu+0xd0/0xd0 [ 745.902971] ? d_instantiate+0x79/0xa0 [ 745.906886] ? lock_downgrade+0x900/0x900 [ 745.911052] ? kasan_check_read+0x11/0x20 [ 745.915205] ? do_raw_spin_unlock+0xa7/0x2f0 [ 745.915220] ? do_raw_spin_trylock+0x270/0x270 09:29:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xdd01, 0xd, &(0x7f0000000080)=""/254) 09:29:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x1c2, 0xd, &(0x7f0000000080)=""/254) [ 745.915237] alloc_empty_file+0x72/0x170 [ 745.915251] alloc_file+0x5e/0x4d0 [ 745.915269] ? _raw_spin_unlock+0x2c/0x50 [ 745.924242] alloc_file_pseudo+0x261/0x3f0 [ 745.924259] ? alloc_file+0x4d0/0x4d0 [ 745.924276] ? usercopy_warn+0x110/0x110 [ 745.924305] __shmem_file_setup.part.50+0x110/0x2a0 [ 745.953106] shmem_file_setup+0x65/0x90 [ 745.957097] __x64_sys_memfd_create+0x2af/0x4f0 [ 745.961779] ? memfd_fcntl+0x18b0/0x18b0 [ 745.965863] do_syscall_64+0x1b9/0x820 [ 745.969761] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 745.969781] ? syscall_return_slowpath+0x5e0/0x5e0 [ 745.969794] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 745.969812] ? trace_hardirqs_on_caller+0x310/0x310 [ 745.980092] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 745.980110] ? prepare_exit_to_usermode+0x291/0x3b0 [ 745.980126] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 745.980144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.009997] RIP: 0033:0x457519 [ 746.013182] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 746.032073] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 746.039774] RAX: ffffffffffffffda RBX: 00000000200024c0 RCX: 0000000000457519 [ 746.047033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 746.054291] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 746.061642] R10: 00000000200024c0 R11: 0000000000000246 R12: 00007ff511a286d4 09:29:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x600000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 746.068911] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 09:29:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x19d, 0xd, &(0x7f0000000080)=""/254) 09:29:06 executing program 0 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x48000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x2000000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xd50, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x9100000000000000, 0xd, &(0x7f0000000080)=""/254) 09:29:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4000000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:06 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5e00000000000000, 0xd, &(0x7f0000000080)=""/254) [ 746.273533] FAULT_INJECTION: forcing a failure. [ 746.273533] name failslab, interval 1, probability 0, space 0, times 0 [ 746.336717] CPU: 1 PID: 10913 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 746.345256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.354609] Call Trace: [ 746.354636] dump_stack+0x244/0x3ab [ 746.354654] ? dump_stack_print_info.cold.2+0x52/0x52 [ 746.354690] ? debug_smp_processor_id+0x1c/0x20 [ 746.360884] ? perf_trace_lock+0x14d/0x7a0 [ 746.360903] should_fail.cold.4+0xa/0x17 [ 746.379025] ? fault_create_debugfs_attr+0x1f0/0x1f0 09:29:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x6000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x40010000, 0xd, &(0x7f0000000080)=""/254) [ 746.384151] ? is_bpf_text_address+0xd3/0x170 [ 746.388683] ? kernel_text_address+0x79/0xf0 [ 746.393111] ? __kernel_text_address+0xd/0x40 [ 746.397626] ? unwind_get_return_address+0x61/0xa0 [ 746.402573] ? __save_stack_trace+0x8d/0xf0 [ 746.406923] ? lock_is_held_type+0x210/0x210 [ 746.411354] ? fs_reclaim_acquire+0x20/0x20 [ 746.415718] ? lock_downgrade+0x900/0x900 [ 746.419876] ? kasan_slab_alloc+0x12/0x20 [ 746.424037] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 746.428892] ? perf_trace_sched_process_exec+0x860/0x860 09:29:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x2, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 746.434360] ? lock_is_held_type+0x210/0x210 [ 746.438788] __should_failslab+0x124/0x180 [ 746.443032] should_failslab+0x9/0x14 [ 746.443051] kmem_cache_alloc_trace+0x2d7/0x750 [ 746.443068] ? __might_sleep+0x95/0x190 [ 746.443088] apparmor_file_alloc_security+0x17b/0xac0 [ 746.443106] ? apparmor_path_rename+0xcd0/0xcd0 [ 746.451559] ? kasan_kmalloc+0xc7/0xe0 [ 746.451578] ? kasan_slab_alloc+0x12/0x20 [ 746.451590] ? kmem_cache_alloc+0x306/0x730 [ 746.451608] ? d_set_d_op+0x31d/0x410 [ 746.481543] security_file_alloc+0x4c/0xa0 [ 746.481559] __alloc_file+0x12a/0x470 [ 746.481572] ? lock_is_held_type+0x1d0/0x210 [ 746.481586] ? file_free_rcu+0xd0/0xd0 [ 746.497882] ? d_instantiate+0x79/0xa0 [ 746.497900] ? lock_downgrade+0x900/0x900 [ 746.497917] ? kasan_check_read+0x11/0x20 [ 746.505942] ? do_raw_spin_unlock+0xa7/0x2f0 [ 746.505956] ? do_raw_spin_trylock+0x270/0x270 [ 746.505974] alloc_empty_file+0x72/0x170 [ 746.505989] alloc_file+0x5e/0x4d0 [ 746.506005] ? _raw_spin_unlock+0x2c/0x50 [ 746.506020] alloc_file_pseudo+0x261/0x3f0 09:29:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xf5010000, 0xd, &(0x7f0000000080)=""/254) 09:29:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x7a00000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 746.506034] ? alloc_file+0x4d0/0x4d0 [ 746.506048] ? usercopy_warn+0x110/0x110 [ 746.506071] __shmem_file_setup.part.50+0x110/0x2a0 [ 746.506086] shmem_file_setup+0x65/0x90 [ 746.506102] __x64_sys_memfd_create+0x2af/0x4f0 [ 746.506115] ? memfd_fcntl+0x18b0/0x18b0 [ 746.506137] do_syscall_64+0x1b9/0x820 [ 746.506149] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 746.506167] ? syscall_return_slowpath+0x5e0/0x5e0 [ 746.526878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 746.526894] ? trace_hardirqs_on_caller+0x310/0x310 [ 746.526911] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 746.564703] ? prepare_exit_to_usermode+0x291/0x3b0 [ 746.579820] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 746.579839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.604879] RIP: 0033:0x457519 [ 746.608089] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 746.627000] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 746.634724] RAX: ffffffffffffffda RBX: 00000000200024c0 RCX: 0000000000457519 [ 746.642000] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 746.649276] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 746.656553] R10: 00000000200024c0 R11: 0000000000000246 R12: 00007ff511a286d4 [ 746.663828] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 09:29:07 executing program 0 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x50, 0xd, &(0x7f0000000080)=""/254) 09:29:07 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4c, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfffffffd, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x5f0b000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x400000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x8a00000000000000, 0xd, &(0x7f0000000080)=""/254) [ 746.799852] __nla_parse: 12 callbacks suppressed [ 746.799859] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 746.815739] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:29:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xa9000000, 0xd, &(0x7f0000000080)=""/254) [ 746.842230] FAULT_INJECTION: forcing a failure. [ 746.842230] name failslab, interval 1, probability 0, space 0, times 0 [ 746.888024] CPU: 1 PID: 10960 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 746.896556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.905916] Call Trace: [ 746.908518] dump_stack+0x244/0x3ab [ 746.912144] ? dump_stack_print_info.cold.2+0x52/0x52 [ 746.917342] ? debug_smp_processor_id+0x1c/0x20 [ 746.922010] ? perf_trace_lock+0x14d/0x7a0 [ 746.926239] should_fail.cold.4+0xa/0x17 [ 746.930306] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 746.935410] ? shmem_setattr+0x50e/0xda0 [ 746.939466] ? lock_downgrade+0x900/0x900 [ 746.943616] ? current_time+0x72/0x1b0 [ 746.947536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.953074] ? check_preemption_disabled+0x48/0x200 [ 746.958089] ? debug_smp_processor_id+0x1c/0x20 [ 746.962749] ? perf_trace_lock+0x14d/0x7a0 [ 746.966975] ? fsnotify+0x4e5/0xf10 [ 746.970595] ? lock_is_held_type+0x210/0x210 [ 746.975010] ? fs_reclaim_acquire+0x20/0x20 [ 746.979330] ? lock_downgrade+0x900/0x900 [ 746.983472] ? perf_trace_sched_process_exec+0x860/0x860 [ 746.988914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.994446] __should_failslab+0x124/0x180 [ 746.998683] should_failslab+0x9/0x14 [ 747.002494] kmem_cache_alloc+0x2be/0x730 [ 747.006654] ? do_sys_ftruncate+0x428/0x550 [ 747.010968] ? lock_downgrade+0x900/0x900 [ 747.015106] getname_flags+0xd0/0x590 [ 747.018898] getname+0x19/0x20 [ 747.022170] do_sys_open+0x383/0x700 [ 747.025876] ? filp_open+0x80/0x80 [ 747.029726] ? trace_hardirqs_off_caller+0x300/0x300 [ 747.034842] ? do_sys_ftruncate+0x449/0x550 [ 747.039168] __x64_sys_open+0x7e/0xc0 [ 747.042959] do_syscall_64+0x1b9/0x820 [ 747.046849] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 747.052204] ? syscall_return_slowpath+0x5e0/0x5e0 [ 747.057122] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 747.061958] ? trace_hardirqs_on_caller+0x310/0x310 [ 747.066963] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 747.071971] ? prepare_exit_to_usermode+0x291/0x3b0 [ 747.076985] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 747.081819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.086995] RIP: 0033:0x411171 [ 747.090191] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 747.109099] RSP: 002b:00007ff511a27a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 747.116813] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000411171 [ 747.124076] RDX: 00007ff511a27afa RSI: 0000000000000002 RDI: 00007ff511a27af0 [ 747.131339] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 09:29:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x30000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 747.138624] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 747.145883] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:07 executing program 0 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xed000000, 0xd, &(0x7f0000000080)=""/254) [ 747.198375] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 747.260053] FAULT_INJECTION: forcing a failure. [ 747.260053] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 747.271903] CPU: 1 PID: 10987 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 747.280398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.289758] Call Trace: [ 747.292367] dump_stack+0x244/0x3ab [ 747.292392] ? dump_stack_print_info.cold.2+0x52/0x52 [ 747.301198] ? lock_is_held_type+0x210/0x210 [ 747.301218] should_fail.cold.4+0xa/0x17 [ 747.301237] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 747.314795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.320351] ? check_preemption_disabled+0x48/0x200 [ 747.325392] ? debug_smp_processor_id+0x1c/0x20 [ 747.330077] ? perf_trace_lock+0x14d/0x7a0 [ 747.334329] ? mark_held_locks+0x130/0x130 [ 747.338574] ? lock_is_held_type+0x210/0x210 [ 747.343012] ? lock_is_held_type+0x210/0x210 [ 747.347438] ? is_bpf_text_address+0xac/0x170 [ 747.351946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.357500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.362515] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 747.363049] ? check_preemption_disabled+0x48/0x200 [ 747.363066] ? debug_smp_processor_id+0x1c/0x20 [ 747.363078] ? perf_trace_lock+0x14d/0x7a0 [ 747.363092] ? lock_is_held_type+0x210/0x210 [ 747.363111] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.395368] ? should_fail+0x22d/0xd01 [ 747.395384] ? lock_is_held_type+0x210/0x210 [ 747.395400] ? fault_create_debugfs_attr+0x1f0/0x1f0 09:29:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xf00, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:07 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xc300000000000000, 0xd, &(0x7f0000000080)=""/254) 09:29:08 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x69010000, 0xd, &(0x7f0000000080)=""/254) [ 747.408798] __alloc_pages_nodemask+0x34b/0xdd0 [ 747.413469] ? current_time+0x72/0x1b0 [ 747.417376] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.422936] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 747.427965] ? debug_smp_processor_id+0x1c/0x20 [ 747.432646] ? perf_trace_lock+0x14d/0x7a0 [ 747.436897] ? fsnotify+0x4e5/0xf10 [ 747.440549] ? fs_reclaim_acquire+0x20/0x20 [ 747.444905] ? lock_downgrade+0x900/0x900 [ 747.449083] ? trace_hardirqs_off+0xb8/0x310 [ 747.453522] cache_grow_begin+0xa5/0x8c0 [ 747.457607] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 747.463160] ? check_preemption_disabled+0x48/0x200 [ 747.468198] kmem_cache_alloc+0x66b/0x730 [ 747.472358] ? do_sys_ftruncate+0x428/0x550 [ 747.472384] getname_flags+0xd0/0x590 [ 747.480495] getname+0x19/0x20 [ 747.480508] do_sys_open+0x383/0x700 [ 747.480525] ? filp_open+0x80/0x80 [ 747.490953] ? trace_hardirqs_off_caller+0x300/0x300 [ 747.496069] ? do_sys_ftruncate+0x449/0x550 [ 747.500422] __x64_sys_open+0x7e/0xc0 [ 747.504241] do_syscall_64+0x1b9/0x820 [ 747.508133] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 747.513492] ? syscall_return_slowpath+0x5e0/0x5e0 [ 747.518431] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 747.523295] ? trace_hardirqs_on_caller+0x310/0x310 [ 747.528314] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 747.533326] ? prepare_exit_to_usermode+0x291/0x3b0 [ 747.538456] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 747.543297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 747.548477] RIP: 0033:0x411171 [ 747.551661] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 747.570552] RSP: 002b:00007ff511a27a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 747.578262] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000411171 [ 747.585518] RDX: 00007ff511a27afa RSI: 0000000000000002 RDI: 00007ff511a27af0 [ 747.592776] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 747.600035] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 747.607294] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xf6ffffff00000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfcfdffff00000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x2000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:08 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xc01, 0xd, &(0x7f0000000080)=""/254) 09:29:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:08 executing program 0 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) [ 747.742509] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 747.766361] FAULT_INJECTION: forcing a failure. [ 747.766361] name failslab, interval 1, probability 0, space 0, times 0 [ 747.785310] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 747.801263] CPU: 0 PID: 11019 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 747.809780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.819142] Call Trace: [ 747.821747] dump_stack+0x244/0x3ab [ 747.825396] ? dump_stack_print_info.cold.2+0x52/0x52 [ 747.830610] ? debug_smp_processor_id+0x1c/0x20 [ 747.830631] ? perf_trace_lock+0x14d/0x7a0 [ 747.839520] should_fail.cold.4+0xa/0x17 [ 747.839537] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 747.848707] ? is_bpf_text_address+0xd3/0x170 [ 747.853214] ? kernel_text_address+0x79/0xf0 [ 747.857637] ? __kernel_text_address+0xd/0x40 [ 747.862137] ? unwind_get_return_address+0x61/0xa0 [ 747.867072] ? __save_stack_trace+0x8d/0xf0 [ 747.867093] ? lock_is_held_type+0x210/0x210 [ 747.875800] ? fs_reclaim_acquire+0x20/0x20 [ 747.875821] ? lock_downgrade+0x900/0x900 [ 747.875839] ? kasan_slab_alloc+0x12/0x20 [ 747.884323] ? do_syscall_64+0x1b9/0x820 09:29:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xb5f, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 747.884339] ? perf_trace_sched_process_exec+0x860/0x860 [ 747.884356] ? lock_is_held_type+0x210/0x210 [ 747.898007] __should_failslab+0x124/0x180 [ 747.898023] should_failslab+0x9/0x14 [ 747.910648] kmem_cache_alloc_trace+0x2d7/0x750 [ 747.915332] ? __might_sleep+0x95/0x190 [ 747.919327] apparmor_file_alloc_security+0x17b/0xac0 [ 747.924533] ? apparmor_path_rename+0xcd0/0xcd0 [ 747.929235] ? kasan_kmalloc+0xc7/0xe0 [ 747.933141] ? kasan_slab_alloc+0x12/0x20 [ 747.937300] ? kmem_cache_alloc+0x306/0x730 [ 747.941633] security_file_alloc+0x4c/0xa0 [ 747.945878] __alloc_file+0x12a/0x470 [ 747.949676] ? file_free_rcu+0xd0/0xd0 [ 747.953569] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 747.958586] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 747.963335] ? lock_is_held_type+0x210/0x210 [ 747.967735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.973280] ? check_preemption_disabled+0x48/0x200 [ 747.978361] alloc_empty_file+0x72/0x170 [ 747.982435] path_openat+0x170/0x5150 [ 747.986246] ? lock_is_held_type+0x210/0x210 [ 747.990644] ? unwind_dump+0x190/0x190 [ 747.994527] ? is_bpf_text_address+0xd3/0x170 [ 747.999027] ? kernel_text_address+0x79/0xf0 [ 748.003427] ? path_lookupat.isra.43+0xc00/0xc00 [ 748.008173] ? unwind_get_return_address+0x61/0xa0 [ 748.013097] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 748.018106] ? expand_files.part.8+0x571/0x9a0 [ 748.022682] ? iterate_fd+0x4b0/0x4b0 [ 748.026475] ? lock_is_held_type+0x210/0x210 [ 748.030873] ? __alloc_fd+0x347/0x6e0 [ 748.034674] ? lock_downgrade+0x900/0x900 [ 748.038825] ? getname+0x19/0x20 [ 748.042186] ? kasan_check_read+0x11/0x20 [ 748.046324] ? do_raw_spin_unlock+0xa7/0x2f0 [ 748.050721] ? do_raw_spin_trylock+0x270/0x270 [ 748.055294] ? __check_object_size+0xb1/0x782 [ 748.059788] ? _raw_spin_unlock+0x2c/0x50 [ 748.063932] ? __alloc_fd+0x347/0x6e0 [ 748.067756] do_filp_open+0x255/0x380 [ 748.071561] ? may_open_dev+0x100/0x100 [ 748.075546] ? get_unused_fd_flags+0x122/0x1a0 [ 748.080122] ? __alloc_fd+0x6e0/0x6e0 [ 748.083917] do_sys_open+0x568/0x700 [ 748.087628] ? filp_open+0x80/0x80 [ 748.091165] ? trace_hardirqs_off_caller+0x300/0x300 [ 748.096255] ? do_sys_ftruncate+0x449/0x550 [ 748.100568] __x64_sys_open+0x7e/0xc0 [ 748.104362] do_syscall_64+0x1b9/0x820 [ 748.108249] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 748.113617] ? syscall_return_slowpath+0x5e0/0x5e0 [ 748.118547] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 748.123384] ? trace_hardirqs_on_caller+0x310/0x310 [ 748.128393] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 748.133400] ? prepare_exit_to_usermode+0x291/0x3b0 [ 748.138409] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 748.143243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.148421] RIP: 0033:0x411171 [ 748.151622] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 748.170542] RSP: 002b:00007ff511a27a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 748.178254] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000411171 [ 748.185537] RDX: 00007ff511a27afa RSI: 0000000000000002 RDI: 00007ff511a27af0 09:29:08 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7d00, 0xd, &(0x7f0000000080)=""/254) [ 748.192848] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 748.200111] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 748.207374] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:08 executing program 0 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x6c, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x74, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x700000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:08 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xd3010000, 0xd, &(0x7f0000000080)=""/254) [ 748.326878] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 748.354663] EXT4-fs: 19 callbacks suppressed [ 748.354674] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 748.378854] FAULT_INJECTION: forcing a failure. [ 748.378854] name failslab, interval 1, probability 0, space 0, times 0 [ 748.417592] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 748.436761] CPU: 0 PID: 11052 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 748.445361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.454723] Call Trace: [ 748.457341] dump_stack+0x244/0x3ab [ 748.460980] ? dump_stack_print_info.cold.2+0x52/0x52 [ 748.461004] ? debug_smp_processor_id+0x1c/0x20 [ 748.470860] ? perf_trace_lock+0x14d/0x7a0 [ 748.475104] should_fail.cold.4+0xa/0x17 [ 748.475122] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 748.475143] ? is_bpf_text_address+0xd3/0x170 [ 748.488868] ? kernel_text_address+0x79/0xf0 [ 748.493293] ? __kernel_text_address+0xd/0x40 [ 748.497801] ? unwind_get_return_address+0x61/0xa0 [ 748.502742] ? __save_stack_trace+0x8d/0xf0 [ 748.507079] ? lock_is_held_type+0x210/0x210 [ 748.507098] ? fs_reclaim_acquire+0x20/0x20 [ 748.515817] ? lock_downgrade+0x900/0x900 [ 748.515831] ? kasan_slab_alloc+0x12/0x20 [ 748.515854] ? do_syscall_64+0x1b9/0x820 [ 748.521272] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 748.524121] ? perf_trace_sched_process_exec+0x860/0x860 [ 748.524136] ? lock_is_held_type+0x210/0x210 [ 748.524159] __should_failslab+0x124/0x180 [ 748.549638] should_failslab+0x9/0x14 [ 748.550180] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 748.553452] kmem_cache_alloc_trace+0x2d7/0x750 [ 748.553470] ? __might_sleep+0x95/0x190 [ 748.553508] apparmor_file_alloc_security+0x17b/0xac0 [ 748.574647] ? apparmor_path_rename+0xcd0/0xcd0 [ 748.579337] ? kasan_kmalloc+0xc7/0xe0 [ 748.583215] ? kasan_slab_alloc+0x12/0x20 [ 748.587361] ? kmem_cache_alloc+0x306/0x730 [ 748.591673] security_file_alloc+0x4c/0xa0 [ 748.595902] __alloc_file+0x12a/0x470 [ 748.599694] ? file_free_rcu+0xd0/0xd0 [ 748.603659] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 748.608669] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 748.613414] ? lock_is_held_type+0x210/0x210 [ 748.617817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.623343] ? check_preemption_disabled+0x48/0x200 [ 748.628349] alloc_empty_file+0x72/0x170 [ 748.632402] path_openat+0x170/0x5150 [ 748.636226] ? lock_is_held_type+0x210/0x210 [ 748.640626] ? unwind_dump+0x190/0x190 [ 748.644526] ? is_bpf_text_address+0xd3/0x170 [ 748.649020] ? kernel_text_address+0x79/0xf0 [ 748.653415] ? path_lookupat.isra.43+0xc00/0xc00 [ 748.658160] ? unwind_get_return_address+0x61/0xa0 [ 748.663079] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 748.668084] ? expand_files.part.8+0x571/0x9a0 [ 748.672660] ? iterate_fd+0x4b0/0x4b0 [ 748.676463] ? lock_is_held_type+0x210/0x210 [ 748.680881] ? __alloc_fd+0x347/0x6e0 [ 748.684673] ? lock_downgrade+0x900/0x900 [ 748.688805] ? getname+0x19/0x20 [ 748.692163] ? kasan_check_read+0x11/0x20 [ 748.696299] ? do_raw_spin_unlock+0xa7/0x2f0 [ 748.700697] ? do_raw_spin_trylock+0x270/0x270 [ 748.705274] ? __check_object_size+0xb1/0x782 [ 748.709771] ? _raw_spin_unlock+0x2c/0x50 [ 748.713911] ? __alloc_fd+0x347/0x6e0 [ 748.717738] do_filp_open+0x255/0x380 [ 748.721553] ? may_open_dev+0x100/0x100 [ 748.725544] ? get_unused_fd_flags+0x122/0x1a0 [ 748.730144] ? __alloc_fd+0x6e0/0x6e0 [ 748.733941] do_sys_open+0x568/0x700 [ 748.737646] ? filp_open+0x80/0x80 [ 748.741182] ? trace_hardirqs_off_caller+0x300/0x300 [ 748.746272] ? do_sys_ftruncate+0x449/0x550 [ 748.750585] __x64_sys_open+0x7e/0xc0 [ 748.754424] do_syscall_64+0x1b9/0x820 [ 748.758299] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 748.763655] ? syscall_return_slowpath+0x5e0/0x5e0 [ 748.768573] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 748.773408] ? trace_hardirqs_on_caller+0x310/0x310 [ 748.778414] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 748.783424] ? prepare_exit_to_usermode+0x291/0x3b0 [ 748.788431] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 748.793276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 748.798455] RIP: 0033:0x411171 [ 748.801653] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 748.820545] RSP: 002b:00007ff511a27a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 748.828248] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000411171 [ 748.835508] RDX: 00007ff511a27afa RSI: 0000000000000002 RDI: 00007ff511a27af0 [ 748.842854] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 748.850113] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 748.857370] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3f000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:09 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xbd000000, 0xd, &(0x7f0000000080)=""/254) 09:29:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x7a000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:09 executing program 0 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) [ 748.924123] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 748.947574] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:29:09 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x8010000, 0xd, &(0x7f0000000080)=""/254) 09:29:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x600000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x9effffff00000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xd50, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 748.977212] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 749.054369] FAULT_INJECTION: forcing a failure. [ 749.054369] name failslab, interval 1, probability 0, space 0, times 0 [ 749.079251] CPU: 1 PID: 11074 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 749.087777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.087783] Call Trace: [ 749.087808] dump_stack+0x244/0x3ab [ 749.087831] ? dump_stack_print_info.cold.2+0x52/0x52 [ 749.108590] ? debug_smp_processor_id+0x1c/0x20 [ 749.109109] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 749.113275] ? perf_trace_lock+0x14d/0x7a0 [ 749.113294] should_fail.cold.4+0xa/0x17 [ 749.113309] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 749.113327] ? lock_is_held_type+0x210/0x210 [ 749.135476] ? check_preemption_disabled+0x48/0x200 [ 749.144901] ? debug_smp_processor_id+0x1c/0x20 [ 749.144915] ? perf_trace_lock+0x14d/0x7a0 09:29:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x100000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 749.144931] ? lock_is_held_type+0x210/0x210 [ 749.158233] ? lock_is_held_type+0x210/0x210 [ 749.162653] ? lock_is_held_type+0x210/0x210 [ 749.167075] ? fs_reclaim_acquire+0x20/0x20 [ 749.171410] ? lock_downgrade+0x900/0x900 [ 749.171430] ? perf_trace_sched_process_exec+0x860/0x860 [ 749.181034] __should_failslab+0x124/0x180 [ 749.185279] should_failslab+0x9/0x14 [ 749.189091] kmem_cache_alloc_trace+0x2d7/0x750 [ 749.193790] __kthread_create_on_node+0x137/0x540 [ 749.198984] ? loop_get_status64+0x140/0x140 09:29:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xfffffffffffff000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 749.198999] ? kthread_parkme+0xb0/0xb0 [ 749.199024] ? ksys_dup3+0x680/0x680 [ 749.211111] ? __lockdep_init_map+0x105/0x590 [ 749.215622] ? __lockdep_init_map+0x105/0x590 [ 749.220130] ? loop_get_status64+0x140/0x140 [ 749.224561] kthread_create_on_node+0xb1/0xe0 [ 749.229067] ? __kthread_create_on_node+0x540/0x540 [ 749.229087] ? kasan_check_read+0x11/0x20 [ 749.238248] lo_ioctl+0x7f6/0x1d60 [ 749.241808] ? lo_rw_aio+0x1ef0/0x1ef0 [ 749.245712] blkdev_ioctl+0x9ac/0x2010 [ 749.249618] ? blkpg_ioctl+0xc10/0xc10 09:29:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xffffff7f00000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 749.253521] ? lock_downgrade+0x900/0x900 [ 749.257691] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 749.262636] ? save_stack+0x43/0xd0 [ 749.266277] ? __kasan_slab_free+0x102/0x150 [ 749.270700] ? __fget+0x4d1/0x740 [ 749.274175] ? ksys_dup3+0x680/0x680 [ 749.277916] block_ioctl+0xee/0x130 [ 749.281570] ? blkdev_fallocate+0x400/0x400 [ 749.285934] do_vfs_ioctl+0x1de/0x1720 [ 749.289844] ? trace_hardirqs_on+0xbd/0x310 [ 749.294182] ? ioctl_preallocate+0x300/0x300 [ 749.298611] ? __fget_light+0x2e9/0x430 [ 749.302601] ? fget_raw+0x20/0x20 [ 749.306063] ? putname+0xf2/0x130 [ 749.309540] ? kmem_cache_free+0x21a/0x290 [ 749.313787] ? putname+0xf7/0x130 [ 749.317257] ? do_sys_open+0x3ac/0x700 [ 749.321170] ? security_file_ioctl+0x94/0xc0 [ 749.325596] ksys_ioctl+0xa9/0xd0 [ 749.329056] __x64_sys_ioctl+0x73/0xb0 [ 749.329077] do_syscall_64+0x1b9/0x820 [ 749.336835] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 749.336851] ? syscall_return_slowpath+0x5e0/0x5e0 [ 749.336868] ? trace_hardirqs_off_thunk+0x1a/0x1c 09:29:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x500000000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 749.351981] ? trace_hardirqs_on_caller+0x310/0x310 [ 749.356346] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 749.357008] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 749.357023] ? prepare_exit_to_usermode+0x291/0x3b0 [ 749.357042] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 749.379263] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 749.384459] RIP: 0033:0x457387 [ 749.387647] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 749.406634] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 749.414352] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 749.421624] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 749.428888] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 749.436147] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 749.436155] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x8cffffff, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x40030000000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xa000000, 0xd, &(0x7f0000000080)=""/254) 09:29:10 executing program 0 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xdc010000, 0xd, &(0x7f0000000080)=""/254) [ 749.554091] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 749.577384] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 749.586599] FAULT_INJECTION: forcing a failure. [ 749.586599] name failslab, interval 1, probability 0, space 0, times 0 [ 749.659690] CPU: 0 PID: 11121 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 749.668227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.677583] Call Trace: [ 749.680185] dump_stack+0x244/0x3ab [ 749.683834] ? dump_stack_print_info.cold.2+0x52/0x52 [ 749.689036] ? debug_smp_processor_id+0x1c/0x20 [ 749.693712] ? perf_trace_lock+0x14d/0x7a0 [ 749.697965] should_fail.cold.4+0xa/0x17 [ 749.702041] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 749.707146] ? pick_next_task_fair+0xa05/0x1b30 [ 749.711823] ? rcu_qs+0x23/0x110 [ 749.715198] ? rcu_note_context_switch+0x7d3/0x2150 [ 749.720222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.725766] ? check_preemption_disabled+0x48/0x200 [ 749.730881] ? debug_smp_processor_id+0x1c/0x20 [ 749.735570] ? perf_trace_lock+0x14d/0x7a0 [ 749.739807] ? __account_cfs_rq_runtime+0x790/0x790 [ 749.744854] ? lock_is_held_type+0x210/0x210 [ 749.749273] ? lock_is_held_type+0x210/0x210 [ 749.753691] ? fs_reclaim_acquire+0x20/0x20 09:29:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7a00000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xe7000000, 0xd, &(0x7f0000000080)=""/254) [ 749.753707] ? lock_downgrade+0x900/0x900 [ 749.753725] ? perf_trace_sched_process_exec+0x860/0x860 [ 749.753741] ? enqueue_entity+0x34b/0x20d0 [ 749.762186] ? perf_trace_lock+0x14d/0x7a0 [ 749.762208] __should_failslab+0x124/0x180 [ 749.762224] should_failslab+0x9/0x14 [ 749.771872] kmem_cache_alloc+0x2be/0x730 [ 749.771890] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 749.771909] __kernfs_new_node+0x127/0x8d0 [ 749.780337] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 749.780352] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.780369] ? lock_is_held_type+0x210/0x210 [ 749.784894] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 749.788284] ? debug_smp_processor_id+0x1c/0x20 [ 749.788297] ? perf_trace_lock+0x14d/0x7a0 [ 749.788317] ? __schedule+0x168b/0x21d0 [ 749.793873] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 749.797537] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 749.797556] ? lock_is_held_type+0x210/0x210 [ 749.797589] ? __sched_text_start+0x8/0x8 [ 749.807857] ? enqueue_task_fair+0x24d/0xa50 [ 749.819582] ? lock_is_held_type+0x210/0x210 [ 749.819600] kernfs_new_node+0x95/0x120 [ 749.819618] kernfs_create_dir_ns+0x4d/0x160 [ 749.870946] internal_create_group+0x5fc/0xd80 [ 749.875536] ? remove_files.isra.1+0x190/0x190 [ 749.880107] ? up_write+0x7b/0x220 [ 749.883629] ? down_write_nested+0x130/0x130 [ 749.888021] ? down_read+0x120/0x120 [ 749.891723] sysfs_create_group+0x1f/0x30 [ 749.895940] lo_ioctl+0x1307/0x1d60 [ 749.899553] ? lo_rw_aio+0x1ef0/0x1ef0 [ 749.903427] blkdev_ioctl+0x9ac/0x2010 [ 749.907298] ? blkpg_ioctl+0xc10/0xc10 [ 749.911168] ? lock_downgrade+0x900/0x900 [ 749.915315] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 749.920239] ? save_stack+0x43/0xd0 [ 749.923847] ? __kasan_slab_free+0x102/0x150 [ 749.928239] ? __fget+0x4d1/0x740 [ 749.931681] ? ksys_dup3+0x680/0x680 [ 749.935416] block_ioctl+0xee/0x130 [ 749.939151] ? blkdev_fallocate+0x400/0x400 [ 749.943470] do_vfs_ioctl+0x1de/0x1720 [ 749.947344] ? trace_hardirqs_on+0xbd/0x310 [ 749.951654] ? ioctl_preallocate+0x300/0x300 [ 749.956045] ? __fget_light+0x2e9/0x430 [ 749.960003] ? fget_raw+0x20/0x20 [ 749.963442] ? putname+0xf2/0x130 [ 749.966882] ? kmem_cache_free+0x21a/0x290 [ 749.971115] ? putname+0xf7/0x130 [ 749.974557] ? do_sys_open+0x3ac/0x700 [ 749.978446] ? security_file_ioctl+0x94/0xc0 [ 749.982864] ksys_ioctl+0xa9/0xd0 [ 749.986311] __x64_sys_ioctl+0x73/0xb0 [ 749.990181] do_syscall_64+0x1b9/0x820 [ 749.994053] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 749.999519] ? syscall_return_slowpath+0x5e0/0x5e0 [ 750.004446] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 750.009302] ? trace_hardirqs_on_caller+0x310/0x310 [ 750.014328] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 750.019335] ? prepare_exit_to_usermode+0x291/0x3b0 [ 750.024341] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 750.029170] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.034452] RIP: 0033:0x457387 [ 750.037643] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 750.056542] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 750.064236] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 750.071512] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 750.078780] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 750.086031] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 750.093281] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xffffff97, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xe100, 0xd, &(0x7f0000000080)=""/254) 09:29:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xf000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:10 executing program 0 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x500, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xaf01, 0xd, &(0x7f0000000080)=""/254) 09:29:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x7000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 750.270304] FAULT_INJECTION: forcing a failure. [ 750.270304] name failslab, interval 1, probability 0, space 0, times 0 [ 750.330108] CPU: 1 PID: 11163 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 750.338677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.348064] Call Trace: [ 750.350666] dump_stack+0x244/0x3ab [ 750.354311] ? dump_stack_print_info.cold.2+0x52/0x52 [ 750.359513] ? debug_smp_processor_id+0x1c/0x20 [ 750.364193] ? perf_trace_lock+0x14d/0x7a0 [ 750.368431] should_fail.cold.4+0xa/0x17 [ 750.368452] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 750.377628] ? perf_trace_lock+0x14d/0x7a0 [ 750.377643] ? lock_release+0xa10/0xa10 [ 750.377658] ? perf_trace_sched_process_exec+0x860/0x860 [ 750.377673] ? lock_is_held_type+0x210/0x210 [ 750.377690] ? check_preemption_disabled+0x48/0x200 [ 750.400725] ? __mutex_lock+0x85e/0x16f0 [ 750.404797] ? kernfs_activate+0x8e/0x2c0 [ 750.408968] ? lock_is_held_type+0x210/0x210 [ 750.413407] ? fs_reclaim_acquire+0x20/0x20 [ 750.417747] ? lock_downgrade+0x900/0x900 [ 750.421903] ? __mutex_lock+0x85e/0x16f0 [ 750.425975] ? perf_trace_sched_process_exec+0x860/0x860 [ 750.431433] ? kernfs_activate+0x21a/0x2c0 [ 750.436064] __should_failslab+0x124/0x180 [ 750.440302] should_failslab+0x9/0x14 [ 750.444125] kmem_cache_alloc+0x2be/0x730 [ 750.448282] ? lock_downgrade+0x900/0x900 [ 750.452437] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 750.457455] __kernfs_new_node+0x127/0x8d0 [ 750.461712] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 750.466472] ? kasan_check_write+0x14/0x20 [ 750.470750] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 750.475685] ? wait_for_completion+0x8a0/0x8a0 09:29:10 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7c, 0xd, &(0x7f0000000080)=""/254) 09:29:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x3, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:11 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x5900000000000000, 0xd, &(0x7f0000000080)=""/254) [ 750.475704] ? wait_for_completion+0x8a0/0x8a0 [ 750.475716] ? kasan_check_write+0x14/0x20 [ 750.475732] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 750.484874] ? mutex_unlock+0xd/0x10 [ 750.484890] ? kernfs_activate+0x21a/0x2c0 [ 750.484906] ? kernfs_walk_and_get_ns+0x340/0x340 [ 750.484924] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 750.484946] ? kernfs_link_sibling+0x1d2/0x3b0 [ 750.484971] kernfs_new_node+0x95/0x120 [ 750.520924] __kernfs_create_file+0x5a/0x340 [ 750.525347] sysfs_add_file_mode_ns+0x222/0x530 [ 750.530035] internal_create_group+0x3df/0xd80 [ 750.534655] ? remove_files.isra.1+0x190/0x190 [ 750.539239] ? up_write+0x7b/0x220 [ 750.539255] ? down_write_nested+0x130/0x130 [ 750.539269] ? down_read+0x120/0x120 [ 750.539289] sysfs_create_group+0x1f/0x30 [ 750.547214] lo_ioctl+0x1307/0x1d60 [ 750.558681] ? lo_rw_aio+0x1ef0/0x1ef0 [ 750.562581] blkdev_ioctl+0x9ac/0x2010 [ 750.566473] ? blkpg_ioctl+0xc10/0xc10 [ 750.570372] ? lock_downgrade+0x900/0x900 [ 750.574533] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 750.574555] ? save_stack+0x43/0xd0 [ 750.574567] ? __kasan_slab_free+0x102/0x150 [ 750.574585] ? __fget+0x4d1/0x740 [ 750.574603] ? ksys_dup3+0x680/0x680 [ 750.574626] block_ioctl+0xee/0x130 [ 750.583142] ? blkdev_fallocate+0x400/0x400 [ 750.583159] do_vfs_ioctl+0x1de/0x1720 [ 750.583176] ? trace_hardirqs_on+0xbd/0x310 [ 750.583191] ? ioctl_preallocate+0x300/0x300 [ 750.583205] ? __fget_light+0x2e9/0x430 [ 750.583219] ? fget_raw+0x20/0x20 [ 750.583233] ? putname+0xf2/0x130 [ 750.602718] ? kmem_cache_free+0x21a/0x290 [ 750.602735] ? putname+0xf7/0x130 [ 750.602752] ? do_sys_open+0x3ac/0x700 [ 750.602770] ? security_file_ioctl+0x94/0xc0 [ 750.602787] ksys_ioctl+0xa9/0xd0 [ 750.610991] __x64_sys_ioctl+0x73/0xb0 [ 750.611008] do_syscall_64+0x1b9/0x820 [ 750.611025] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 750.634030] ? syscall_return_slowpath+0x5e0/0x5e0 [ 750.634045] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 750.634058] ? trace_hardirqs_on_caller+0x310/0x310 [ 750.634098] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 750.642379] ? prepare_exit_to_usermode+0x291/0x3b0 [ 750.642397] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 750.642417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 750.693727] RIP: 0033:0x457387 [ 750.696923] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 750.715811] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 750.723526] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 750.730779] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 750.738032] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 750.745283] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 750.752553] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0xfffffff0, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x500d0000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x500000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:11 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xc500000000000000, 0xd, &(0x7f0000000080)=""/254) 09:29:11 executing program 0 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:11 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfffffdfd, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x7a00, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 750.909360] FAULT_INJECTION: forcing a failure. [ 750.909360] name failslab, interval 1, probability 0, space 0, times 0 [ 750.920781] CPU: 0 PID: 11209 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 750.929270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.938630] Call Trace: [ 750.941239] dump_stack+0x244/0x3ab [ 750.944882] ? dump_stack_print_info.cold.2+0x52/0x52 [ 750.950081] ? __kernel_text_address+0xd/0x40 [ 750.954592] ? unwind_get_return_address+0x61/0xa0 [ 750.959621] should_fail.cold.4+0xa/0x17 [ 750.963712] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 750.968819] ? save_stack+0xa9/0xd0 [ 750.972452] ? kasan_kmalloc+0xc7/0xe0 [ 750.976343] ? kasan_slab_alloc+0x12/0x20 [ 750.980496] ? kmem_cache_alloc+0x12e/0x730 [ 750.984819] ? radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 750.990699] ? idr_get_free+0x7a4/0xf70 [ 750.990713] ? idr_alloc_u32+0x1d4/0x3a0 [ 750.990729] ? idr_alloc_cyclic+0x166/0x350 [ 751.003057] ? kernfs_new_node+0x95/0x120 [ 751.007217] ? kernfs_create_dir_ns+0x4d/0x160 [ 751.011812] ? internal_create_group+0x5fc/0xd80 [ 751.016577] ? sysfs_create_group+0x1f/0x30 [ 751.020915] ? lo_ioctl+0x1307/0x1d60 [ 751.024721] ? blkdev_ioctl+0x9ac/0x2010 [ 751.029323] ? block_ioctl+0xee/0x130 [ 751.033133] ? do_vfs_ioctl+0x1de/0x1720 [ 751.037199] ? ksys_ioctl+0xa9/0xd0 [ 751.040834] ? __x64_sys_ioctl+0x73/0xb0 [ 751.044904] ? do_syscall_64+0x1b9/0x820 [ 751.049068] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 751.054428] ? lock_is_held_type+0x210/0x210 [ 751.054441] ? __update_load_avg_se+0xae0/0xae0 [ 751.054459] ? update_load_avg+0x387/0x2470 [ 751.054474] ? __update_load_avg_se+0xae0/0xae0 [ 751.072595] ? perf_sched_cb_inc+0x350/0x350 [ 751.077027] ? trace_hardirqs_on+0xbd/0x310 [ 751.081354] ? radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 751.081372] ? memcg_kmem_get_cache+0x910/0x910 [ 751.081389] ? kasan_unpoison_shadow+0x35/0x50 [ 751.096489] __should_failslab+0x124/0x180 [ 751.100734] should_failslab+0x9/0x14 [ 751.104556] kmem_cache_alloc+0x47/0x730 [ 751.108635] ? lock_downgrade+0x900/0x900 [ 751.112804] ? radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 751.112825] radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 751.124680] idr_get_free+0x7a4/0xf70 [ 751.128510] ? radix_tree_iter_tag_clear+0x90/0x90 [ 751.133450] ? __save_stack_trace+0x8d/0xf0 [ 751.137787] ? save_stack+0xa9/0xd0 [ 751.141420] ? save_stack+0x43/0xd0 [ 751.145065] ? kasan_slab_alloc+0x12/0x20 [ 751.149210] ? kmem_cache_alloc+0x12e/0x730 [ 751.149225] ? __kernfs_new_node+0x127/0x8d0 [ 751.149237] ? kernfs_new_node+0x95/0x120 [ 751.149253] ? kernfs_create_dir_ns+0x4d/0x160 [ 751.166652] ? internal_create_group+0x5fc/0xd80 [ 751.171408] ? sysfs_create_group+0x1f/0x30 [ 751.175750] ? lo_ioctl+0x1307/0x1d60 [ 751.179564] ? blkdev_ioctl+0x9ac/0x2010 [ 751.183646] ? block_ioctl+0xee/0x130 [ 751.187455] ? do_vfs_ioctl+0x1de/0x1720 [ 751.191518] ? ksys_ioctl+0xa9/0xd0 [ 751.195155] ? __x64_sys_ioctl+0x73/0xb0 [ 751.199467] ? do_syscall_64+0x1b9/0x820 [ 751.203535] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 751.208921] ? lock_is_held_type+0x210/0x210 [ 751.213344] idr_alloc_u32+0x1d4/0x3a0 [ 751.217248] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 751.222104] ? lock_acquire+0x1ed/0x520 [ 751.226079] ? __kernfs_new_node+0x14e/0x8d0 [ 751.226095] ? perf_trace_lock+0x14d/0x7a0 [ 751.226106] ? __kernfs_new_node+0x127/0x8d0 [ 751.226125] idr_alloc_cyclic+0x166/0x350 [ 751.234762] ? idr_alloc+0x1b0/0x1b0 [ 751.234776] ? __radix_tree_preload+0x1f7/0x280 [ 751.234794] __kernfs_new_node+0x1ee/0x8d0 [ 751.234812] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 751.260778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 751.266335] ? lock_is_held_type+0x210/0x210 [ 751.270751] ? debug_smp_processor_id+0x1c/0x20 [ 751.275431] ? perf_trace_lock+0x14d/0x7a0 [ 751.279672] ? try_to_wake_up+0x10a/0x12e0 [ 751.283916] ? lock_is_held_type+0x210/0x210 [ 751.288342] ? check_preempt_curr+0x3a0/0x3a0 [ 751.292854] ? enqueue_task_fair+0x24d/0xa50 [ 751.297276] ? lock_is_held_type+0x210/0x210 [ 751.301698] kernfs_new_node+0x95/0x120 [ 751.305665] kernfs_create_dir_ns+0x4d/0x160 [ 751.310065] internal_create_group+0x5fc/0xd80 [ 751.314640] ? remove_files.isra.1+0x190/0x190 [ 751.319209] ? up_write+0x7b/0x220 [ 751.322742] ? down_write_nested+0x130/0x130 [ 751.327141] ? down_read+0x120/0x120 [ 751.330859] sysfs_create_group+0x1f/0x30 [ 751.335007] lo_ioctl+0x1307/0x1d60 [ 751.338639] ? lo_rw_aio+0x1ef0/0x1ef0 [ 751.342516] blkdev_ioctl+0x9ac/0x2010 [ 751.346392] ? blkpg_ioctl+0xc10/0xc10 [ 751.350273] ? lock_downgrade+0x900/0x900 [ 751.354416] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 751.359339] ? save_stack+0x43/0xd0 [ 751.362952] ? __kasan_slab_free+0x102/0x150 [ 751.367352] ? __fget+0x4d1/0x740 [ 751.370798] ? ksys_dup3+0x680/0x680 [ 751.374507] block_ioctl+0xee/0x130 [ 751.378127] ? blkdev_fallocate+0x400/0x400 [ 751.382438] do_vfs_ioctl+0x1de/0x1720 [ 751.386420] ? trace_hardirqs_on+0xbd/0x310 [ 751.390727] ? ioctl_preallocate+0x300/0x300 [ 751.395131] ? __fget_light+0x2e9/0x430 [ 751.399088] ? fget_raw+0x20/0x20 [ 751.402532] ? putname+0xf2/0x130 [ 751.405979] ? kmem_cache_free+0x21a/0x290 [ 751.410203] ? putname+0xf7/0x130 [ 751.413642] ? do_sys_open+0x3ac/0x700 [ 751.417514] ? security_file_ioctl+0x94/0xc0 [ 751.421913] ksys_ioctl+0xa9/0xd0 [ 751.425355] __x64_sys_ioctl+0x73/0xb0 [ 751.429235] do_syscall_64+0x1b9/0x820 [ 751.433114] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 751.438469] ? syscall_return_slowpath+0x5e0/0x5e0 [ 751.443495] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 751.448434] ? trace_hardirqs_on_caller+0x310/0x310 [ 751.453439] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 751.458442] ? prepare_exit_to_usermode+0x291/0x3b0 [ 751.463543] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 751.468408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 751.473594] RIP: 0033:0x457387 [ 751.476773] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 751.495656] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 751.503352] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 09:29:11 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xc6010000, 0xd, &(0x7f0000000080)=""/254) 09:29:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x3000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:11 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0xaa00, 0xd, &(0x7f0000000080)=""/254) 09:29:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x5000000, 0x0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:11 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x9e00000000000000, 0xd, &(0x7f0000000080)=""/254) [ 751.510610] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 751.517867] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 751.525121] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 751.532388] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x5, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x48, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1f00000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:12 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2010000, 0xd, &(0x7f0000000080)=""/254) 09:29:12 executing program 0 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xffffff97, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x6800000000000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:12 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x7d000000, 0xd, &(0x7f0000000080)=""/254) [ 751.813879] FAULT_INJECTION: forcing a failure. [ 751.813879] name failslab, interval 1, probability 0, space 0, times 0 [ 751.834170] CPU: 0 PID: 11270 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 751.842709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 751.852065] Call Trace: [ 751.854663] dump_stack+0x244/0x3ab [ 751.858296] ? dump_stack_print_info.cold.2+0x52/0x52 09:29:12 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x2301, 0xd, &(0x7f0000000080)=""/254) [ 751.863599] ? debug_smp_processor_id+0x1c/0x20 [ 751.868288] ? perf_trace_lock+0x14d/0x7a0 [ 751.872531] should_fail.cold.4+0xa/0x17 [ 751.876596] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 751.881707] ? perf_trace_lock+0x14d/0x7a0 [ 751.885939] ? lock_release+0xa10/0xa10 [ 751.885955] ? perf_trace_sched_process_exec+0x860/0x860 [ 751.885970] ? lock_is_held_type+0x210/0x210 [ 751.885988] ? check_preemption_disabled+0x48/0x200 [ 751.895386] ? __mutex_lock+0x85e/0x16f0 [ 751.895403] ? kernfs_activate+0x8e/0x2c0 09:29:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xf00000000000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 751.895430] ? lock_is_held_type+0x210/0x210 [ 751.895448] ? fs_reclaim_acquire+0x20/0x20 [ 751.921905] ? lock_downgrade+0x900/0x900 [ 751.926064] ? __mutex_lock+0x85e/0x16f0 [ 751.930139] ? perf_trace_sched_process_exec+0x860/0x860 [ 751.935598] ? kernfs_activate+0x21a/0x2c0 [ 751.939845] __should_failslab+0x124/0x180 [ 751.944087] should_failslab+0x9/0x14 [ 751.948005] kmem_cache_alloc+0x2be/0x730 [ 751.948022] ? lock_downgrade+0x900/0x900 [ 751.948043] ? __sanitizer_cov_trace_cmp8+0x18/0x20 09:29:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xfffff000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 751.956313] __kernfs_new_node+0x127/0x8d0 [ 751.956333] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 751.956347] ? kasan_check_write+0x14/0x20 [ 751.956371] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 751.976655] __nla_parse: 16 callbacks suppressed [ 751.976663] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 751.979500] ? wait_for_completion+0x8a0/0x8a0 [ 751.979520] ? wait_for_completion+0x8a0/0x8a0 [ 751.979541] ? kasan_check_write+0x14/0x20 [ 752.006249] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 752.011191] ? mutex_unlock+0xd/0x10 09:29:12 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0x13, &(0x7f0000000080)=""/254) [ 752.014918] ? kernfs_activate+0x21a/0x2c0 [ 752.019162] ? kernfs_walk_and_get_ns+0x340/0x340 [ 752.024102] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 752.029651] ? kernfs_link_sibling+0x1d2/0x3b0 [ 752.029671] kernfs_new_node+0x95/0x120 [ 752.029689] __kernfs_create_file+0x5a/0x340 [ 752.037055] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 752.038228] sysfs_add_file_mode_ns+0x222/0x530 [ 752.038248] internal_create_group+0x3df/0xd80 [ 752.038268] ? remove_files.isra.1+0x190/0x190 [ 752.051041] ? up_write+0x7b/0x220 [ 752.051055] ? down_write_nested+0x130/0x130 [ 752.051073] ? down_read+0x120/0x120 [ 752.076505] sysfs_create_group+0x1f/0x30 [ 752.080662] lo_ioctl+0x1307/0x1d60 [ 752.084301] ? lo_rw_aio+0x1ef0/0x1ef0 [ 752.088194] blkdev_ioctl+0x9ac/0x2010 [ 752.092094] ? blkpg_ioctl+0xc10/0xc10 [ 752.095985] ? lock_downgrade+0x900/0x900 [ 752.100145] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 752.105221] ? save_stack+0x43/0xd0 [ 752.108834] ? __kasan_slab_free+0x102/0x150 [ 752.113248] ? __fget+0x4d1/0x740 [ 752.116704] ? ksys_dup3+0x680/0x680 [ 752.120428] block_ioctl+0xee/0x130 [ 752.124052] ? blkdev_fallocate+0x400/0x400 [ 752.128374] do_vfs_ioctl+0x1de/0x1720 [ 752.132255] ? trace_hardirqs_on+0xbd/0x310 [ 752.136567] ? ioctl_preallocate+0x300/0x300 [ 752.141059] ? __fget_light+0x2e9/0x430 [ 752.145028] ? fget_raw+0x20/0x20 [ 752.148492] ? putname+0xf2/0x130 [ 752.151927] ? kmem_cache_free+0x21a/0x290 [ 752.156143] ? putname+0xf7/0x130 [ 752.159579] ? do_sys_open+0x3ac/0x700 [ 752.163450] ? security_file_ioctl+0x94/0xc0 [ 752.167845] ksys_ioctl+0xa9/0xd0 [ 752.171299] __x64_sys_ioctl+0x73/0xb0 [ 752.175177] do_syscall_64+0x1b9/0x820 [ 752.179053] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 752.184401] ? syscall_return_slowpath+0x5e0/0x5e0 [ 752.189324] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 752.194149] ? trace_hardirqs_on_caller+0x310/0x310 [ 752.199147] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 752.204162] ? prepare_exit_to_usermode+0x291/0x3b0 [ 752.209261] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 752.214089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.219260] RIP: 0033:0x457387 [ 752.222438] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 752.241325] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 752.249013] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 752.256270] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 752.263531] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 752.270784] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 752.278032] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfffffff6, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x6000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 752.396474] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 752.405836] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:29:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4800000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0x2, &(0x7f0000000080)=""/254) 09:29:13 executing program 0 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x20000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x7a000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0x10, &(0x7f0000000080)=""/254) [ 752.513003] FAULT_INJECTION: forcing a failure. [ 752.513003] name failslab, interval 1, probability 0, space 0, times 0 [ 752.532923] CPU: 0 PID: 11320 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 752.541560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.550922] Call Trace: [ 752.553519] dump_stack+0x244/0x3ab [ 752.553541] ? dump_stack_print_info.cold.2+0x52/0x52 09:29:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=""/254) [ 752.553564] ? debug_smp_processor_id+0x1c/0x20 [ 752.562492] ? perf_trace_lock+0x14d/0x7a0 [ 752.562513] should_fail.cold.4+0xa/0x17 [ 752.562534] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 752.580565] ? perf_trace_lock+0x14d/0x7a0 [ 752.584958] ? lock_release+0xa10/0xa10 [ 752.588944] ? perf_trace_sched_process_exec+0x860/0x860 [ 752.594401] ? lock_is_held_type+0x210/0x210 [ 752.598814] ? check_preemption_disabled+0x48/0x200 [ 752.598840] ? __mutex_lock+0x85e/0x16f0 [ 752.598858] ? kernfs_activate+0x8e/0x2c0 09:29:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0x12, &(0x7f0000000080)=""/254) [ 752.607918] ? lock_is_held_type+0x210/0x210 [ 752.616460] ? fs_reclaim_acquire+0x20/0x20 [ 752.620793] ? lock_downgrade+0x900/0x900 [ 752.624960] ? __mutex_lock+0x85e/0x16f0 [ 752.629143] ? perf_trace_sched_process_exec+0x860/0x860 [ 752.634609] ? kernfs_activate+0x21a/0x2c0 [ 752.638862] __should_failslab+0x124/0x180 [ 752.643109] should_failslab+0x9/0x14 [ 752.646922] kmem_cache_alloc+0x2be/0x730 [ 752.651082] ? lock_downgrade+0x900/0x900 [ 752.655240] ? __sanitizer_cov_trace_cmp8+0x18/0x20 09:29:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xf, &(0x7f0000000080)=""/254) 09:29:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0x3, &(0x7f0000000080)=""/254) [ 752.660268] __kernfs_new_node+0x127/0x8d0 [ 752.664511] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 752.669276] ? kasan_check_write+0x14/0x20 [ 752.673523] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 752.678464] ? wait_for_completion+0x8a0/0x8a0 [ 752.683060] ? wait_for_completion+0x8a0/0x8a0 [ 752.687651] ? kasan_check_write+0x14/0x20 [ 752.691896] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 752.696846] ? mutex_unlock+0xd/0x10 [ 752.700567] ? kernfs_activate+0x21a/0x2c0 [ 752.704816] ? kernfs_walk_and_get_ns+0x340/0x340 [ 752.709668] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 752.709685] ? kernfs_link_sibling+0x1d2/0x3b0 [ 752.709708] kernfs_new_node+0x95/0x120 [ 752.719812] __kernfs_create_file+0x5a/0x340 [ 752.719833] sysfs_add_file_mode_ns+0x222/0x530 [ 752.719854] internal_create_group+0x3df/0xd80 [ 752.737456] ? remove_files.isra.1+0x190/0x190 [ 752.742045] ? up_write+0x7b/0x220 [ 752.745603] ? down_write_nested+0x130/0x130 [ 752.750018] ? down_read+0x120/0x120 [ 752.753751] sysfs_create_group+0x1f/0x30 [ 752.757904] lo_ioctl+0x1307/0x1d60 [ 752.761541] ? lo_rw_aio+0x1ef0/0x1ef0 [ 752.765440] blkdev_ioctl+0x9ac/0x2010 [ 752.769337] ? blkpg_ioctl+0xc10/0xc10 [ 752.773232] ? lock_downgrade+0x900/0x900 [ 752.777485] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 752.782438] ? save_stack+0x43/0xd0 [ 752.786083] ? __kasan_slab_free+0x102/0x150 [ 752.790490] ? __fget+0x4d1/0x740 [ 752.793953] ? ksys_dup3+0x680/0x680 [ 752.797688] block_ioctl+0xee/0x130 [ 752.801325] ? blkdev_fallocate+0x400/0x400 [ 752.805650] do_vfs_ioctl+0x1de/0x1720 [ 752.809552] ? trace_hardirqs_on+0xbd/0x310 [ 752.813883] ? ioctl_preallocate+0x300/0x300 [ 752.818304] ? __fget_light+0x2e9/0x430 [ 752.822287] ? fget_raw+0x20/0x20 [ 752.825747] ? putname+0xf2/0x130 [ 752.829199] ? kmem_cache_free+0x21a/0x290 [ 752.833427] ? putname+0xf7/0x130 [ 752.836888] ? do_sys_open+0x3ac/0x700 [ 752.840771] ? security_file_ioctl+0x94/0xc0 [ 752.845165] ksys_ioctl+0xa9/0xd0 [ 752.848603] __x64_sys_ioctl+0x73/0xb0 [ 752.852478] do_syscall_64+0x1b9/0x820 [ 752.856354] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 752.861789] ? syscall_return_slowpath+0x5e0/0x5e0 [ 752.866702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 752.871540] ? trace_hardirqs_on_caller+0x310/0x310 [ 752.876552] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 752.881550] ? prepare_exit_to_usermode+0x291/0x3b0 [ 752.886556] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 752.891397] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 752.896577] RIP: 0033:0x457387 [ 752.899770] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 752.918654] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 752.926346] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 752.933786] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 752.941043] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 752.948295] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 752.955548] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xb, &(0x7f0000000080)=""/254) 09:29:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xf6ffffff, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x300, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:13 executing program 0 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x500d, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:13 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0x14, &(0x7f0000000080)=""/254) [ 753.229792] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 753.240845] FAULT_INJECTION: forcing a failure. [ 753.240845] name failslab, interval 1, probability 0, space 0, times 0 [ 753.264172] CPU: 0 PID: 11376 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 753.272691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.282049] Call Trace: [ 753.284655] dump_stack+0x244/0x3ab [ 753.288307] ? dump_stack_print_info.cold.2+0x52/0x52 [ 753.293510] ? debug_smp_processor_id+0x1c/0x20 [ 753.298194] ? perf_trace_lock+0x14d/0x7a0 [ 753.302443] should_fail.cold.4+0xa/0x17 [ 753.306511] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 753.306529] ? perf_trace_lock+0x14d/0x7a0 [ 753.315848] ? lock_release+0xa10/0xa10 [ 753.315860] ? perf_trace_sched_process_exec+0x860/0x860 [ 753.315881] ? lock_is_held_type+0x210/0x210 [ 753.329849] ? check_preemption_disabled+0x48/0x200 [ 753.334882] ? __mutex_lock+0x85e/0x16f0 [ 753.338948] ? kernfs_activate+0x8e/0x2c0 [ 753.338967] ? lock_is_held_type+0x210/0x210 [ 753.347700] ? fs_reclaim_acquire+0x20/0x20 [ 753.352025] ? lock_downgrade+0x900/0x900 [ 753.352044] ? __mutex_lock+0x85e/0x16f0 [ 753.360234] ? perf_trace_sched_process_exec+0x860/0x860 [ 753.365695] ? kernfs_activate+0x21a/0x2c0 [ 753.369946] __should_failslab+0x124/0x180 [ 753.374191] should_failslab+0x9/0x14 09:29:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x200000000000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:14 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) 09:29:14 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/null\x00', 0x400281, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000800), 0x4) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x800, 0x0) syz_open_dev$rtc(&(0x7f0000000840)='/dev/rtc#\x00', 0x7, 0x200000) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000006c0)={0x7, 0x0, [{0x107001, 0xe6, &(0x7f0000000180)=""/230}, {0xf000, 0x46, &(0x7f0000000280)=""/70}, {0xd002, 0x68, &(0x7f0000000300)=""/104}, {0xf001, 0xe5, &(0x7f0000000380)=""/229}, {0x0, 0xda, &(0x7f0000000480)=""/218}, {0x6000, 0x6c, &(0x7f0000000580)=""/108}, {0xd000, 0xaa, &(0x7f0000000600)=""/170}]}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000880)={0x0, 0xfff}, &(0x7f00000008c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000900)={r2, 0x2, 0x30}, 0xc) [ 753.374207] kmem_cache_alloc+0x2be/0x730 [ 753.374220] ? lock_downgrade+0x900/0x900 [ 753.374239] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 753.382153] __kernfs_new_node+0x127/0x8d0 [ 753.382171] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 753.400290] ? kasan_check_write+0x14/0x20 [ 753.404541] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 753.409495] ? wait_for_completion+0x8a0/0x8a0 [ 753.414224] ? wait_for_completion+0x8a0/0x8a0 [ 753.418808] ? kasan_check_write+0x14/0x20 [ 753.423049] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 753.427982] ? mutex_unlock+0xd/0x10 [ 753.431695] ? kernfs_activate+0x21a/0x2c0 [ 753.431712] ? kernfs_walk_and_get_ns+0x340/0x340 [ 753.440763] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 753.440774] ? kernfs_link_sibling+0x1d2/0x3b0 [ 753.440794] kernfs_new_node+0x95/0x120 [ 753.454839] __kernfs_create_file+0x5a/0x340 [ 753.459250] sysfs_add_file_mode_ns+0x222/0x530 [ 753.464016] internal_create_group+0x3df/0xd80 [ 753.468738] ? remove_files.isra.1+0x190/0x190 [ 753.473322] ? up_write+0x7b/0x220 09:29:14 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x0, 0x0, 0x400) r0 = semget(0x1, 0x7, 0x2) semget$private(0x0, 0x1, 0x1) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000180)=""/254) 09:29:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x4800, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 753.476873] ? down_write_nested+0x130/0x130 [ 753.481293] ? down_read+0x120/0x120 [ 753.485020] sysfs_create_group+0x1f/0x30 [ 753.489176] lo_ioctl+0x1307/0x1d60 [ 753.492835] ? lo_rw_aio+0x1ef0/0x1ef0 [ 753.496734] blkdev_ioctl+0x9ac/0x2010 [ 753.500645] ? blkpg_ioctl+0xc10/0xc10 [ 753.500665] ? lock_downgrade+0x900/0x900 [ 753.508677] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 753.508697] ? save_stack+0x43/0xd0 [ 753.517227] ? __kasan_slab_free+0x102/0x150 [ 753.521647] ? __fget+0x4d1/0x740 [ 753.523948] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 753.525113] ? ksys_dup3+0x680/0x680 [ 753.525137] block_ioctl+0xee/0x130 [ 753.540838] ? blkdev_fallocate+0x400/0x400 [ 753.545166] do_vfs_ioctl+0x1de/0x1720 [ 753.549058] ? trace_hardirqs_on+0xbd/0x310 [ 753.553394] ? ioctl_preallocate+0x300/0x300 [ 753.557815] ? __fget_light+0x2e9/0x430 [ 753.561799] ? fget_raw+0x20/0x20 [ 753.565271] ? putname+0xf2/0x130 [ 753.568735] ? kmem_cache_free+0x21a/0x290 [ 753.572979] ? putname+0xf7/0x130 [ 753.576451] ? do_sys_open+0x3ac/0x700 [ 753.580353] ? security_file_ioctl+0x94/0xc0 [ 753.584773] ksys_ioctl+0xa9/0xd0 [ 753.588230] __x64_sys_ioctl+0x73/0xb0 [ 753.588250] do_syscall_64+0x1b9/0x820 [ 753.595996] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 753.596013] ? syscall_return_slowpath+0x5e0/0x5e0 [ 753.596043] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 753.611155] ? trace_hardirqs_on_caller+0x310/0x310 [ 753.616180] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 753.621199] ? prepare_exit_to_usermode+0x291/0x3b0 [ 753.626210] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 753.631048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 753.636233] RIP: 0033:0x457387 [ 753.639410] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 753.658318] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 753.666037] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 753.673291] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 753.680546] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 753.687803] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 753.695078] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x300, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x7a00, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 753.753570] EXT4-fs: 26 callbacks suppressed [ 753.753582] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 753.768022] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 753.779933] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 753.802426] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:29:14 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000180)=""/254) 09:29:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xf00, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4000000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:14 executing program 0 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) [ 753.860119] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:29:14 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40002, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000180)={0xfff, 0x8, 0x7, 0x2, 0x992, 0x4}) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) [ 753.921353] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 753.962841] FAULT_INJECTION: forcing a failure. [ 753.962841] name failslab, interval 1, probability 0, space 0, times 0 [ 753.975688] CPU: 1 PID: 11439 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 753.984205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.993554] Call Trace: [ 753.993580] dump_stack+0x244/0x3ab [ 753.993601] ? dump_stack_print_info.cold.2+0x52/0x52 [ 753.993620] ? debug_smp_processor_id+0x1c/0x20 [ 754.009670] ? perf_trace_lock+0x14d/0x7a0 [ 754.013926] should_fail.cold.4+0xa/0x17 [ 754.017998] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 754.023112] ? perf_trace_lock+0x14d/0x7a0 [ 754.027355] ? lock_release+0xa10/0xa10 [ 754.031340] ? perf_trace_sched_process_exec+0x860/0x860 [ 754.036800] ? lock_is_held_type+0x210/0x210 [ 754.041223] ? check_preemption_disabled+0x48/0x200 [ 754.046250] ? __mutex_lock+0x85e/0x16f0 [ 754.046268] ? kernfs_activate+0x8e/0x2c0 [ 754.054495] ? lock_is_held_type+0x210/0x210 [ 754.058911] ? fs_reclaim_acquire+0x20/0x20 [ 754.063244] ? lock_downgrade+0x900/0x900 [ 754.065406] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 754.067398] ? __mutex_lock+0x85e/0x16f0 [ 754.067419] ? perf_trace_sched_process_exec+0x860/0x860 [ 754.084288] ? kernfs_activate+0x21a/0x2c0 [ 754.088544] __should_failslab+0x124/0x180 [ 754.092784] should_failslab+0x9/0x14 [ 754.096590] kmem_cache_alloc+0x2be/0x730 [ 754.100736] ? lock_downgrade+0x900/0x900 [ 754.104890] ? __sanitizer_cov_trace_cmp8+0x18/0x20 09:29:14 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000001c0)={0xffffffffffffffff}, 0x2, {0xa, 0x4e23, 0x100000001, @mcast1, 0x7}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {&(0x7f0000000180), r1}}, 0x18) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) [ 754.109909] __kernfs_new_node+0x127/0x8d0 [ 754.114153] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 754.118919] ? kasan_check_write+0x14/0x20 [ 754.123168] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 754.128120] ? wait_for_completion+0x8a0/0x8a0 [ 754.132717] ? wait_for_completion+0x8a0/0x8a0 [ 754.137307] ? kasan_check_write+0x14/0x20 [ 754.141546] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 754.146487] ? mutex_unlock+0xd/0x10 [ 754.150317] ? kernfs_activate+0x21a/0x2c0 [ 754.154564] ? kernfs_walk_and_get_ns+0x340/0x340 09:29:14 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) r1 = syz_open_dev$mice(&(0x7f00000004c0)='/dev/input/mice\x00', 0x0, 0x40003) close(r1) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e24, 0x2948, @loopback, 0x7ff}}, 0x80, 0x6, 0x6, 0x50e3, 0x80}, &(0x7f0000000240)=0x98) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f00000001c0)={&(0x7f0000000180)=[0xffff, 0x7], 0x2, 0xffffffff, 0x1, 0x6, 0x10001, 0x16, {0x5e8f2e58, 0x8, 0x6, 0x6, 0x267, 0x3aa, 0x7fff, 0x4, 0x7ff, 0x0, 0x400, 0x1, 0x6, 0x31804662, "82de24aa8cdeb376e5da23e59959762a7a3da88db75eafe304d688736089b2d0"}}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000280)={r2, 0x1ff, 0x30, 0xfffffffffffff7d1, 0x8001}, &(0x7f00000002c0)=0x18) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000040)) uname(&(0x7f0000000040)) [ 754.159414] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 754.164953] ? kernfs_link_sibling+0x1d2/0x3b0 [ 754.169541] kernfs_new_node+0x95/0x120 [ 754.173518] __kernfs_create_file+0x5a/0x340 [ 754.173539] sysfs_add_file_mode_ns+0x222/0x530 [ 754.173560] internal_create_group+0x3df/0xd80 [ 754.173580] ? remove_files.isra.1+0x190/0x190 [ 754.182625] ? up_write+0x7b/0x220 [ 754.182639] ? down_write_nested+0x130/0x130 [ 754.182651] ? down_read+0x120/0x120 [ 754.182671] sysfs_create_group+0x1f/0x30 [ 754.191809] lo_ioctl+0x1307/0x1d60 [ 754.199727] ? lo_rw_aio+0x1ef0/0x1ef0 [ 754.204437] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 754.207548] blkdev_ioctl+0x9ac/0x2010 [ 754.207565] ? blkpg_ioctl+0xc10/0xc10 [ 754.207586] ? lock_downgrade+0x900/0x900 [ 754.234316] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 754.239265] ? save_stack+0x43/0xd0 [ 754.242891] ? __kasan_slab_free+0x102/0x150 [ 754.247287] ? __fget+0x4d1/0x740 [ 754.250750] ? ksys_dup3+0x680/0x680 [ 754.254452] block_ioctl+0xee/0x130 [ 754.258060] ? blkdev_fallocate+0x400/0x400 [ 754.262368] do_vfs_ioctl+0x1de/0x1720 [ 754.266242] ? trace_hardirqs_on+0xbd/0x310 [ 754.270546] ? ioctl_preallocate+0x300/0x300 [ 754.274939] ? __fget_light+0x2e9/0x430 [ 754.278895] ? fget_raw+0x20/0x20 [ 754.282332] ? putname+0xf2/0x130 [ 754.285863] ? kmem_cache_free+0x21a/0x290 [ 754.290084] ? putname+0xf7/0x130 [ 754.293526] ? do_sys_open+0x3ac/0x700 [ 754.297399] ? security_file_ioctl+0x94/0xc0 [ 754.301991] ksys_ioctl+0xa9/0xd0 [ 754.305474] __x64_sys_ioctl+0x73/0xb0 [ 754.309357] do_syscall_64+0x1b9/0x820 [ 754.313239] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 754.318610] ? syscall_return_slowpath+0x5e0/0x5e0 [ 754.323552] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 754.328382] ? trace_hardirqs_on_caller+0x310/0x310 [ 754.333388] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 754.338398] ? prepare_exit_to_usermode+0x291/0x3b0 [ 754.343516] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 754.348363] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 754.353541] RIP: 0033:0x457387 [ 754.356722] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 754.375606] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 754.383302] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 754.390553] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 754.397825] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 754.405087] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 09:29:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x4800000000000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 754.412338] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 [ 754.429404] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 754.438398] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:29:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x100000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x300000000000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:15 executing program 0 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 754.514925] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 754.609249] FAULT_INJECTION: forcing a failure. [ 754.609249] name failslab, interval 1, probability 0, space 0, times 0 [ 754.615280] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 754.630520] CPU: 1 PID: 11479 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 754.639030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.639037] Call Trace: [ 754.639062] dump_stack+0x244/0x3ab [ 754.639082] ? dump_stack_print_info.cold.2+0x52/0x52 [ 754.639100] ? debug_smp_processor_id+0x1c/0x20 [ 754.639116] ? perf_trace_lock+0x14d/0x7a0 [ 754.639134] should_fail.cold.4+0xa/0x17 [ 754.639153] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 754.677875] ? perf_trace_lock+0x14d/0x7a0 [ 754.677890] ? lock_release+0xa10/0xa10 [ 754.677907] ? perf_trace_sched_process_exec+0x860/0x860 [ 754.691656] ? lock_is_held_type+0x210/0x210 [ 754.691671] ? check_preemption_disabled+0x48/0x200 [ 754.691694] ? __mutex_lock+0x85e/0x16f0 [ 754.705161] ? kernfs_activate+0x8e/0x2c0 [ 754.709317] ? lock_is_held_type+0x210/0x210 [ 754.713729] ? fs_reclaim_acquire+0x20/0x20 [ 754.713745] ? lock_downgrade+0x900/0x900 [ 754.713765] ? __mutex_lock+0x85e/0x16f0 [ 754.713783] ? perf_trace_sched_process_exec+0x860/0x860 [ 754.726288] ? kernfs_activate+0x21a/0x2c0 [ 754.735959] __should_failslab+0x124/0x180 [ 754.740208] should_failslab+0x9/0x14 [ 754.744025] kmem_cache_alloc+0x2be/0x730 [ 754.745276] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 754.748183] ? lock_downgrade+0x900/0x900 [ 754.748200] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 754.748220] __kernfs_new_node+0x127/0x8d0 [ 754.768946] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 754.773710] ? kasan_check_write+0x14/0x20 [ 754.777952] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 754.782892] ? wait_for_completion+0x8a0/0x8a0 [ 754.787484] ? wait_for_completion+0x8a0/0x8a0 [ 754.792068] ? kasan_check_write+0x14/0x20 [ 754.796317] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 754.796335] ? mutex_unlock+0xd/0x10 [ 754.796351] ? kernfs_activate+0x21a/0x2c0 [ 754.804969] ? kernfs_walk_and_get_ns+0x340/0x340 [ 754.804995] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 754.805009] ? kernfs_link_sibling+0x1d2/0x3b0 [ 754.805028] kernfs_new_node+0x95/0x120 [ 754.805044] __kernfs_create_file+0x5a/0x340 [ 754.805063] sysfs_add_file_mode_ns+0x222/0x530 [ 754.816468] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 754.819673] internal_create_group+0x3df/0xd80 [ 754.819695] ? remove_files.isra.1+0x190/0x190 [ 754.819712] ? up_write+0x7b/0x220 [ 754.857420] ? down_write_nested+0x130/0x130 [ 754.861837] ? down_read+0x120/0x120 [ 754.865543] sysfs_create_group+0x1f/0x30 [ 754.869677] lo_ioctl+0x1307/0x1d60 [ 754.873307] ? lo_rw_aio+0x1ef0/0x1ef0 [ 754.877178] blkdev_ioctl+0x9ac/0x2010 [ 754.881140] ? blkpg_ioctl+0xc10/0xc10 [ 754.885014] ? lock_downgrade+0x900/0x900 [ 754.889151] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 754.894066] ? save_stack+0x43/0xd0 [ 754.897674] ? __kasan_slab_free+0x102/0x150 [ 754.902068] ? __fget+0x4d1/0x740 [ 754.905524] ? ksys_dup3+0x680/0x680 [ 754.909230] block_ioctl+0xee/0x130 [ 754.912856] ? blkdev_fallocate+0x400/0x400 [ 754.917173] do_vfs_ioctl+0x1de/0x1720 [ 754.921046] ? trace_hardirqs_on+0xbd/0x310 [ 754.925368] ? ioctl_preallocate+0x300/0x300 [ 754.929780] ? __fget_light+0x2e9/0x430 [ 754.933751] ? fget_raw+0x20/0x20 [ 754.937185] ? putname+0xf2/0x130 [ 754.940636] ? kmem_cache_free+0x21a/0x290 [ 754.944887] ? putname+0xf7/0x130 [ 754.948322] ? do_sys_open+0x3ac/0x700 [ 754.952192] ? security_file_ioctl+0x94/0xc0 [ 754.956596] ksys_ioctl+0xa9/0xd0 [ 754.960034] __x64_sys_ioctl+0x73/0xb0 [ 754.963910] do_syscall_64+0x1b9/0x820 [ 754.967799] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 754.973148] ? syscall_return_slowpath+0x5e0/0x5e0 [ 754.978058] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 754.982895] ? trace_hardirqs_on_caller+0x310/0x310 [ 754.987906] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 754.992918] ? prepare_exit_to_usermode+0x291/0x3b0 [ 754.997924] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 755.002759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.007940] RIP: 0033:0x457387 [ 755.011126] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 755.030122] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 755.038067] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 755.045406] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 755.052690] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 09:29:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xf0ffffffffffff, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:15 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x301000, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10ec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x1, r0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) 09:29:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x600, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:15 executing program 0 (fault-call:2 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) [ 755.059962] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 755.067215] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x68000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:15 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x2, 0x1, 0x82) semget$private(0x0, 0x5, 0x101) r0 = semget(0x2, 0x4, 0x100) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000180)=""/254) 09:29:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xfffffffffffff000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x10000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 755.218704] FAULT_INJECTION: forcing a failure. [ 755.218704] name failslab, interval 1, probability 0, space 0, times 0 09:29:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:15 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000180)) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) [ 755.261951] CPU: 1 PID: 11514 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 755.270484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.279838] Call Trace: [ 755.282472] dump_stack+0x244/0x3ab [ 755.286115] ? dump_stack_print_info.cold.2+0x52/0x52 [ 755.291317] ? debug_smp_processor_id+0x1c/0x20 [ 755.295990] ? perf_trace_lock+0x14d/0x7a0 [ 755.300234] should_fail.cold.4+0xa/0x17 [ 755.300252] ? fault_create_debugfs_attr+0x1f0/0x1f0 09:29:15 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x800, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000180)={@rand_addr, @broadcast, @dev}, &(0x7f00000001c0)=0xc) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000200)=""/124) [ 755.300271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.315045] ? wake_up_klogd+0x11a/0x180 [ 755.319115] ? console_device+0xc0/0xc0 [ 755.323197] ? vprintk_emit+0x322/0x930 [ 755.327180] ? __down_trylock_console_sem+0x151/0x1f0 [ 755.332375] ? vprintk_emit+0x268/0x930 [ 755.336352] ? wake_up_klogd+0x180/0x180 [ 755.340439] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 755.345985] ? lock_is_held_type+0x210/0x210 [ 755.350396] ? fs_reclaim_acquire+0x20/0x20 [ 755.354731] ? lock_downgrade+0x900/0x900 09:29:15 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget(0x0, 0x6, 0x14) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x57ab453ca797c37b, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000080)=""/254) 09:29:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x200000, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000200)={0x1, 'gre0\x00', 0x3}, 0x18) write$P9_RUNLINKAT(r0, &(0x7f0000000180)={0x7, 0x4d, 0x1}, 0x7) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x1, 0x2000) fcntl$notify(r0, 0x402, 0x80000001) write$P9_RXATTRCREATE(r1, &(0x7f00000003c0)={0x7, 0x21, 0x1}, 0x7) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000240)={{{@in=@dev, @in=@loopback}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) fcntl$addseals(r0, 0x409, 0x0) [ 755.358886] ? perf_trace_sched_process_exec+0x860/0x860 [ 755.364342] ? vprintk_default+0x28/0x30 [ 755.368415] __should_failslab+0x124/0x180 [ 755.372651] should_failslab+0x9/0x14 [ 755.376456] kmem_cache_alloc_trace+0x2d7/0x750 [ 755.381136] kobject_uevent_env+0x2f3/0x101e [ 755.385561] kobject_uevent+0x1f/0x24 [ 755.389370] lo_ioctl+0x1385/0x1d60 [ 755.393008] ? lo_rw_aio+0x1ef0/0x1ef0 [ 755.396893] blkdev_ioctl+0x9ac/0x2010 [ 755.400784] ? blkpg_ioctl+0xc10/0xc10 [ 755.404680] ? lock_downgrade+0x900/0x900 09:29:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x100000000000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 755.408843] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 755.413779] ? save_stack+0x43/0xd0 [ 755.417405] ? __kasan_slab_free+0x102/0x150 [ 755.421841] ? __fget+0x4d1/0x740 [ 755.425312] ? ksys_dup3+0x680/0x680 [ 755.425357] block_ioctl+0xee/0x130 [ 755.432671] ? blkdev_fallocate+0x400/0x400 [ 755.436993] do_vfs_ioctl+0x1de/0x1720 [ 755.440887] ? trace_hardirqs_on+0xbd/0x310 [ 755.445332] ? ioctl_preallocate+0x300/0x300 [ 755.449747] ? __fget_light+0x2e9/0x430 [ 755.453731] ? fget_raw+0x20/0x20 [ 755.457186] ? putname+0xf2/0x130 [ 755.460660] ? kmem_cache_free+0x21a/0x290 [ 755.464905] ? putname+0xf7/0x130 [ 755.468366] ? do_sys_open+0x3ac/0x700 [ 755.472266] ? security_file_ioctl+0x94/0xc0 [ 755.476708] ksys_ioctl+0xa9/0xd0 [ 755.480168] __x64_sys_ioctl+0x73/0xb0 [ 755.484065] do_syscall_64+0x1b9/0x820 [ 755.487963] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 755.493344] ? syscall_return_slowpath+0x5e0/0x5e0 [ 755.498279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 755.503110] ? trace_hardirqs_on_caller+0x310/0x310 [ 755.508111] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 755.513127] ? prepare_exit_to_usermode+0x291/0x3b0 [ 755.518133] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 755.522966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 755.528135] RIP: 0033:0x457387 [ 755.531329] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 755.550213] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 755.557905] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 755.565165] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 755.572417] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 755.579668] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 755.586933] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2d, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:16 executing program 0 (fault-call:2 fault-nth:19): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:16 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x0, 0x3, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'vlan0\x00', {0x2, 0x4e21, @multicast2}}) r1 = semget(0x0, 0x0, 0x100) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000280)=""/254) 09:29:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x3f00000000000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x1000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 755.888950] FAULT_INJECTION: forcing a failure. [ 755.888950] name failslab, interval 1, probability 0, space 0, times 0 [ 755.930794] CPU: 1 PID: 11576 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 755.939318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.939325] Call Trace: [ 755.939343] dump_stack+0x244/0x3ab [ 755.939362] ? dump_stack_print_info.cold.2+0x52/0x52 [ 755.951305] ? debug_smp_processor_id+0x1c/0x20 [ 755.951327] ? perf_trace_lock+0x14d/0x7a0 [ 755.969262] should_fail.cold.4+0xa/0x17 [ 755.973329] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 755.978438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.983977] ? wake_up_klogd+0x11a/0x180 [ 755.983991] ? console_device+0xc0/0xc0 [ 755.984006] ? vprintk_emit+0x322/0x930 [ 755.984024] ? __down_trylock_console_sem+0x151/0x1f0 [ 755.984041] ? vprintk_emit+0x268/0x930 [ 755.992075] ? wake_up_klogd+0x180/0x180 [ 755.992096] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 756.015011] ? lock_is_held_type+0x210/0x210 [ 756.019436] ? fs_reclaim_acquire+0x20/0x20 [ 756.023770] ? lock_downgrade+0x900/0x900 [ 756.027931] ? perf_trace_sched_process_exec+0x860/0x860 [ 756.033478] ? vprintk_default+0x28/0x30 [ 756.037544] __should_failslab+0x124/0x180 [ 756.041770] should_failslab+0x9/0x14 [ 756.045565] kmem_cache_alloc_trace+0x2d7/0x750 [ 756.050220] kobject_uevent_env+0x2f3/0x101e [ 756.054618] kobject_uevent+0x1f/0x24 [ 756.058410] lo_ioctl+0x1385/0x1d60 [ 756.062039] ? lo_rw_aio+0x1ef0/0x1ef0 [ 756.065910] blkdev_ioctl+0x9ac/0x2010 [ 756.069778] ? blkpg_ioctl+0xc10/0xc10 [ 756.073653] ? lock_downgrade+0x900/0x900 [ 756.077789] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 756.082708] ? save_stack+0x43/0xd0 [ 756.086344] ? __kasan_slab_free+0x102/0x150 [ 756.090749] ? __fget+0x4d1/0x740 [ 756.094200] ? ksys_dup3+0x680/0x680 [ 756.097930] block_ioctl+0xee/0x130 [ 756.101555] ? blkdev_fallocate+0x400/0x400 [ 756.105860] do_vfs_ioctl+0x1de/0x1720 [ 756.109756] ? trace_hardirqs_on+0xbd/0x310 [ 756.114065] ? ioctl_preallocate+0x300/0x300 [ 756.118458] ? __fget_light+0x2e9/0x430 [ 756.122428] ? fget_raw+0x20/0x20 [ 756.125883] ? putname+0xf2/0x130 [ 756.129320] ? kmem_cache_free+0x21a/0x290 [ 756.133538] ? putname+0xf7/0x130 [ 756.136976] ? do_sys_open+0x3ac/0x700 [ 756.140845] ? security_file_ioctl+0x94/0xc0 [ 756.145267] ksys_ioctl+0xa9/0xd0 [ 756.148708] __x64_sys_ioctl+0x73/0xb0 [ 756.152580] do_syscall_64+0x1b9/0x820 [ 756.156471] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 756.161818] ? syscall_return_slowpath+0x5e0/0x5e0 [ 756.166731] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 756.171556] ? trace_hardirqs_on_caller+0x310/0x310 [ 756.176555] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 756.181558] ? prepare_exit_to_usermode+0x291/0x3b0 [ 756.186562] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 756.191393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.196568] RIP: 0033:0x457387 [ 756.199748] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 756.218819] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 09:29:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2000000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x500d000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x0, 0x2, 0x30) semget(0x2, 0x0, 0x28) r0 = semget(0x2, 0x2, 0x1a) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000240)=""/254) 09:29:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x3f000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:16 executing program 0 (fault-call:2 fault-nth:20): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x34000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 756.226512] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 756.233762] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 756.241016] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 756.248267] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 756.255516] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:16 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) [ 756.377985] FAULT_INJECTION: forcing a failure. [ 756.377985] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 756.389833] CPU: 0 PID: 11603 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 756.398359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.407802] Call Trace: [ 756.410403] dump_stack+0x244/0x3ab [ 756.414050] ? dump_stack_print_info.cold.2+0x52/0x52 [ 756.419263] ? up+0xea/0x1c0 [ 756.422302] ? lock_is_held_type+0x210/0x210 [ 756.426728] should_fail.cold.4+0xa/0x17 [ 756.430802] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 756.435916] ? console_unlock+0x832/0x1160 [ 756.440152] ? lock_downgrade+0x900/0x900 [ 756.444310] ? mark_held_locks+0x130/0x130 [ 756.448556] ? vprintk_emit+0x33d/0x930 [ 756.452538] ? trace_hardirqs_off_caller+0x300/0x300 [ 756.457642] ? lock_is_held_type+0x210/0x210 [ 756.462063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.467606] ? check_preemption_disabled+0x48/0x200 [ 756.472627] ? llist_add_batch+0x106/0x170 [ 756.476875] ? debug_smp_processor_id+0x1c/0x20 [ 756.481555] ? perf_trace_lock+0x14d/0x7a0 [ 756.485800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.491354] ? should_fail+0x22d/0xd01 [ 756.495247] ? lock_is_held_type+0x210/0x210 [ 756.499668] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 756.504783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.510338] ? wake_up_klogd+0x11a/0x180 [ 756.514413] __alloc_pages_nodemask+0x34b/0xdd0 [ 756.519089] ? __down_trylock_console_sem+0x151/0x1f0 [ 756.524294] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 756.529315] ? vprintk_emit+0x268/0x930 [ 756.533309] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 756.538867] ? fs_reclaim_acquire+0x20/0x20 [ 756.543193] ? lock_downgrade+0x900/0x900 [ 756.543220] ? trace_hardirqs_off+0xb8/0x310 [ 756.551754] cache_grow_begin+0xa5/0x8c0 [ 756.551769] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 756.551786] ? check_preemption_disabled+0x48/0x200 [ 756.561362] kmem_cache_alloc_trace+0x684/0x750 [ 756.561384] kobject_uevent_env+0x2f3/0x101e [ 756.561404] kobject_uevent+0x1f/0x24 [ 756.571056] lo_ioctl+0x1385/0x1d60 [ 756.571075] ? lo_rw_aio+0x1ef0/0x1ef0 [ 756.571091] blkdev_ioctl+0x9ac/0x2010 [ 756.590642] ? blkpg_ioctl+0xc10/0xc10 [ 756.594534] ? lock_downgrade+0x900/0x900 [ 756.598692] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 756.603633] ? save_stack+0x43/0xd0 [ 756.607265] ? __kasan_slab_free+0x102/0x150 [ 756.611687] ? __fget+0x4d1/0x740 [ 756.615175] ? ksys_dup3+0x680/0x680 [ 756.618930] block_ioctl+0xee/0x130 [ 756.622569] ? blkdev_fallocate+0x400/0x400 09:29:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x30000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget(0x0, 0x1, 0x2) r0 = semget(0x3, 0x0, 0xda) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000080)=""/254) 09:29:17 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x400, 0x800) semctl$GETALL(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000180)=""/254) 09:29:17 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x200000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2, 0x100b}}, 0x20) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) [ 756.622586] do_vfs_ioctl+0x1de/0x1720 [ 756.622603] ? trace_hardirqs_on+0xbd/0x310 [ 756.622618] ? ioctl_preallocate+0x300/0x300 [ 756.622630] ? __fget_light+0x2e9/0x430 [ 756.622646] ? fget_raw+0x20/0x20 [ 756.630840] ? putname+0xf2/0x130 [ 756.630857] ? kmem_cache_free+0x21a/0x290 [ 756.630871] ? putname+0xf7/0x130 [ 756.630887] ? do_sys_open+0x3ac/0x700 [ 756.661950] ? security_file_ioctl+0x94/0xc0 [ 756.666385] ksys_ioctl+0xa9/0xd0 [ 756.669855] __x64_sys_ioctl+0x73/0xb0 [ 756.673749] do_syscall_64+0x1b9/0x820 [ 756.677637] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 756.683116] ? syscall_return_slowpath+0x5e0/0x5e0 [ 756.683132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 756.683150] ? trace_hardirqs_on_caller+0x310/0x310 [ 756.683164] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 756.683186] ? prepare_exit_to_usermode+0x291/0x3b0 [ 756.692953] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 756.692974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 756.692985] RIP: 0033:0x457387 [ 756.693000] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 756.693012] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 [ 756.740263] ORIG_RAX: 0000000000000010 [ 756.740272] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 756.740280] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 756.740286] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 756.740297] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 756.749616] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:17 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) fcntl$addseals(r0, 0x409, 0x8) 09:29:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfcfdffff00000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x4c000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x500d0000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:17 executing program 0 (fault-call:2 fault-nth:21): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:17 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0xf7, 0x7, 0x2, 0x0, 0x0, 0x6, 0x60800, 0xb, 0x3f, 0xffffffff, 0x9, 0x36, 0xffffffff, 0x3, 0x4a, 0x5, 0xe8, 0x51, 0xfff, 0x9, 0x7fffffff, 0x2, 0x8000, 0x10001, 0xfffffffffffffeae, 0xfffffffffffffff9, 0x9b4, 0x10000, 0x1f, 0x100, 0xf0, 0x6, 0x7, 0x4, 0x1, 0xfffffffffffffff2, 0x0, 0x3ff, 0x1, @perf_config_ext={0x6, 0x7}, 0x20040, 0x1f, 0x9c3, 0x1, 0xe3, 0x7, 0xfff}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, r0, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) [ 756.919237] __nla_parse: 10 callbacks suppressed [ 756.919246] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:29:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x2000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 756.982419] FAULT_INJECTION: forcing a failure. [ 756.982419] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 756.994277] CPU: 0 PID: 11657 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 756.994287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.994297] Call Trace: [ 757.014942] dump_stack+0x244/0x3ab [ 757.018584] ? dump_stack_print_info.cold.2+0x52/0x52 [ 757.023777] ? up+0xea/0x1c0 [ 757.026819] ? lock_is_held_type+0x210/0x210 [ 757.031712] should_fail.cold.4+0xa/0x17 [ 757.035786] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 757.040904] ? console_unlock+0x832/0x1160 [ 757.045139] ? lock_downgrade+0x900/0x900 [ 757.049305] ? mark_held_locks+0x130/0x130 [ 757.053543] ? vprintk_emit+0x33d/0x930 [ 757.057529] ? trace_hardirqs_off_caller+0x300/0x300 [ 757.062640] ? lock_is_held_type+0x210/0x210 [ 757.064941] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 757.067064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.067078] ? check_preemption_disabled+0x48/0x200 [ 757.067096] ? llist_add_batch+0x106/0x170 [ 757.086021] ? debug_smp_processor_id+0x1c/0x20 [ 757.086037] ? perf_trace_lock+0x14d/0x7a0 [ 757.086053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.086069] ? should_fail+0x22d/0xd01 [ 757.108568] ? lock_is_held_type+0x210/0x210 [ 757.112986] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 757.118100] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.123642] ? wake_up_klogd+0x11a/0x180 [ 757.127714] __alloc_pages_nodemask+0x34b/0xdd0 09:29:17 executing program 1: r0 = semget$private(0x0, 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="3d664c01911f803417d309a7589cd21db5e9f022990dd9313cbc7ee5e7474e2d53e5beea7fd6390e67d5d1e53acdf78493f2393d36ca796def838c009cf3f601bd4dbe1e74e3409f59694d9606cc647b9179b65b0920775671a6f7d2db01bce01706840114c26de6730dae2cb44154a92db17498eb4e56c0feec64c435c7086ea6a0bad58dc5fc4c39a035f4304d4378b4fd03a501e271bf280aa1a7e34220a24172a214e1a4d51137981d1ea05746ad3936aa51b6e5ac71621c80719c82534dba8b", 0xc2, 0x100000001}], 0x4000, &(0x7f0000000300)={[{@data_journal='data=journal'}, {@nouser_xattr='nouser_xattr'}], [{@smackfsroot={'smackfsroot'}}, {@appraise='appraise'}, {@appraise_type='appraise_type=imasig'}, {@obj_user={'obj_user', 0x3d, '--'}}]}) 09:29:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x4000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 757.132391] ? __down_trylock_console_sem+0x151/0x1f0 [ 757.137593] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 757.142611] ? vprintk_emit+0x268/0x930 [ 757.142638] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 757.142658] ? fs_reclaim_acquire+0x20/0x20 [ 757.142675] ? lock_downgrade+0x900/0x900 [ 757.152163] ? trace_hardirqs_off+0xb8/0x310 [ 757.152182] cache_grow_begin+0xa5/0x8c0 [ 757.152212] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 757.174631] ? check_preemption_disabled+0x48/0x200 [ 757.179657] kmem_cache_alloc_trace+0x684/0x750 [ 757.179680] kobject_uevent_env+0x2f3/0x101e [ 757.179699] kobject_uevent+0x1f/0x24 [ 757.192576] lo_ioctl+0x1385/0x1d60 [ 757.196458] ? lo_rw_aio+0x1ef0/0x1ef0 [ 757.196479] blkdev_ioctl+0x9ac/0x2010 [ 757.196497] ? blkpg_ioctl+0xc10/0xc10 [ 757.208132] ? lock_downgrade+0x900/0x900 [ 757.212295] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 757.217242] ? save_stack+0x43/0xd0 [ 757.220872] ? __kasan_slab_free+0x102/0x150 [ 757.225293] ? __fget+0x4d1/0x740 [ 757.228761] ? ksys_dup3+0x680/0x680 09:29:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x400300, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 757.229324] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 757.232499] block_ioctl+0xee/0x130 [ 757.232517] ? blkdev_fallocate+0x400/0x400 [ 757.232532] do_vfs_ioctl+0x1de/0x1720 [ 757.232553] ? trace_hardirqs_on+0xbd/0x310 [ 757.257160] ? ioctl_preallocate+0x300/0x300 [ 757.261596] ? __fget_light+0x2e9/0x430 [ 757.265579] ? fget_raw+0x20/0x20 [ 757.269028] ? putname+0xf2/0x130 [ 757.269052] ? kmem_cache_free+0x21a/0x290 [ 757.269071] ? putname+0xf7/0x130 [ 757.276747] ? do_sys_open+0x3ac/0x700 [ 757.276766] ? security_file_ioctl+0x94/0xc0 [ 757.276791] ksys_ioctl+0xa9/0xd0 [ 757.276808] __x64_sys_ioctl+0x73/0xb0 [ 757.295938] do_syscall_64+0x1b9/0x820 [ 757.299854] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 757.305229] ? syscall_return_slowpath+0x5e0/0x5e0 [ 757.310170] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 757.310957] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 757.315029] ? trace_hardirqs_on_caller+0x310/0x310 [ 757.315052] ? prepare_exit_to_usermode+0x3b0/0x3b0 09:29:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xf000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 757.315068] ? prepare_exit_to_usermode+0x291/0x3b0 [ 757.315086] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 757.315104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.343319] RIP: 0033:0x457387 [ 757.343335] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 757.343344] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 757.343360] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 757.343369] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 757.343377] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 757.343384] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 757.343390] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 [ 757.419603] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "smackfsroot=" [ 757.461303] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:29:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x8cffffff00000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:18 executing program 0 (fault-call:2 fault-nth:22): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6800000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1f00, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 757.553611] REISERFS warning (device loop1): super-6502 reiserfs_getopt: unknown mount option "smackfsroot=" 09:29:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x4c00, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:18 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x1, 0x1) semctl$SEM_STAT(r0, 0x4, 0x12, &(0x7f0000000180)=""/108) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0xf) [ 757.651270] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 757.676198] FAULT_INJECTION: forcing a failure. [ 757.676198] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 757.688137] CPU: 1 PID: 11709 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 757.688152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.705980] Call Trace: [ 757.708600] dump_stack+0x244/0x3ab [ 757.712267] ? dump_stack_print_info.cold.2+0x52/0x52 [ 757.717460] ? trace_hardirqs_off+0xb8/0x310 [ 757.721875] should_fail.cold.4+0xa/0x17 [ 757.726070] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 757.731196] ? kobject_uevent_env+0xf76/0x101e [ 757.735915] ? wait_for_completion+0x8a0/0x8a0 [ 757.740509] ? __kasan_slab_free+0x119/0x150 [ 757.744929] ? mark_held_locks+0x130/0x130 09:29:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x6000000000000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 757.749166] ? kobject_uevent_env+0x100d/0x101e [ 757.753845] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.759401] ? check_preemption_disabled+0x48/0x200 [ 757.764430] ? debug_smp_processor_id+0x1c/0x20 [ 757.769104] ? perf_trace_lock+0x14d/0x7a0 [ 757.773351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.778891] ? should_fail+0x22d/0xd01 [ 757.782793] ? lock_is_held_type+0x210/0x210 [ 757.787220] ? blkdev_ioctl+0x15d/0x2010 [ 757.791294] ? fault_create_debugfs_attr+0x1f0/0x1f0 09:29:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x6800000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x68, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 757.791565] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 757.796413] ? blkpg_ioctl+0xc10/0xc10 [ 757.796429] ? lock_downgrade+0x900/0x900 [ 757.796452] __alloc_pages_nodemask+0x34b/0xdd0 [ 757.796470] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 757.796487] ? save_stack+0x43/0xd0 [ 757.826176] ? __kasan_slab_free+0x102/0x150 [ 757.830599] ? __fget+0x4d1/0x740 [ 757.834078] ? fs_reclaim_acquire+0x20/0x20 [ 757.838504] ? lock_downgrade+0x900/0x900 [ 757.838527] ? trace_hardirqs_off+0xb8/0x310 [ 757.838547] cache_grow_begin+0xa5/0x8c0 [ 757.851122] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 757.851139] ? check_preemption_disabled+0x48/0x200 [ 757.851159] kmem_cache_alloc+0x66b/0x730 [ 757.863675] ? fget_raw+0x20/0x20 [ 757.863694] getname_flags+0xd0/0x590 [ 757.863711] do_mkdirat+0xc5/0x310 [ 757.863735] ? __ia32_sys_mknod+0xb0/0xb0 [ 757.863747] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.863770] ? trace_hardirqs_off_caller+0x300/0x300 [ 757.875119] ? ksys_ioctl+0x81/0xd0 [ 757.875135] __x64_sys_mkdir+0x5c/0x80 [ 757.875153] do_syscall_64+0x1b9/0x820 [ 757.882799] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 757.882817] ? syscall_return_slowpath+0x5e0/0x5e0 [ 757.882831] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 757.882847] ? trace_hardirqs_on_caller+0x310/0x310 [ 757.882859] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 757.882876] ? prepare_exit_to_usermode+0x291/0x3b0 [ 757.893307] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 757.893326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 757.893337] RIP: 0033:0x456957 09:29:18 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e21, 0xffffffff, @ipv4, 0x2}}}, &(0x7f0000000240)=0x84) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000003c0)={'irlan0\x00', {0x2, 0x4e23, @broadcast}}) close(r1) r4 = getpgid(0xffffffffffffffff) r5 = perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x5, 0x400, 0x4, 0x13e, 0x0, 0x4, 0x0, 0x6, 0x40, 0x0, 0x10001, 0x0, 0x8, 0x5eb, 0xfffffffffffffff8, 0x8, 0x100000001, 0x3f80000, 0x44, 0x7, 0x7ff, 0x1, 0x6, 0x3, 0x4, 0x1, 0x10001, 0x7, 0x4, 0x3, 0x8, 0x0, 0x5, 0x40, 0xffffffff, 0x8, 0x0, 0x3, 0x2, @perf_config_ext={0x80000000, 0x40}, 0x44, 0x9, 0x40, 0x7, 0xfffffffffffffffb, 0x71}, r4, 0x8, r0, 0x2) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000280)=ANY=[@ANYRES32=r3, @ANYBLOB="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"], &(0x7f0000000380)=0xff) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) io_setup(0x8, &(0x7f0000000480)=0x0) r7 = syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0x9, 0x404003) io_submit(r6, 0x8, &(0x7f0000001b40)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0xe9e, r7, &(0x7f0000000500)="bba91eb200bf7447b8a395eee8baf74dee1da3a32c38dcc22d3f35191606c1d482aafa6bb88e1f3bb987862558330c86771cc7082a05f36f10f59a612d23314203245322037c51", 0x47, 0x8, 0x0, 0x1, r2}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x7, 0x2d37, r2, &(0x7f00000005c0)="9c2a2926d151ea03e8d85c954c23f03eab65cf79394b22f46d6b6e88b4f06f7c1b1b6dc3db8e501d323dfa45e0265da0ff659988b703348256529fbfe9accaf4484718d95a008150be6d0337181a8ace9604010272ca", 0x56, 0x2, 0x0, 0x1, r2}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x3, 0x8, r1, &(0x7f0000000680)="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", 0x1000, 0x1, 0x0, 0x1, r2}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x7, 0x7, r2, &(0x7f00000016c0)="621709033a5119d90c0079b8be57ba68e39826d1ab11912f0f2166288e235556dcfbebf487fb8140b56677bc0b9cc815254226c88337c4f28efdc361464ca4a6134bc0de52690d0c471e0d35c7f60e5d36b1223b3f7d4e2988ec435d5063452753688ddccbe9fc54efdca5a21d7bca41dd36a03f5efcecd48563745bde76d8f4160a3d2a8e5e19d4d968c5423bdc4174c90843cf5a27bb000801c047d221c0a8f976c66ed2020bb96ee8c65c956ee15e0d7b584917535abbb216dc964a10aacdd4644b27380334da770a1304ff7b005fe892d82cdf5b565c38fd340b", 0xdc, 0x0, 0x0, 0x1}, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x4, r0, &(0x7f0000001800)="57ddc2f04518eb8f5d03bf15bdb317bb01f12f44b83513d0ef5a3f329f5d444c491a56d81214d5153d87282d6413b78a32972c1bce507d9c1fe4bdebc407265af2eebe8082f3699da267c19cc3a8afcafde4dbdae9b4158a2deabd6086dc3fce2934f4081348f7daa57c5fd45c9da8aed3cea02331c019437be995bff66c9d560ef6e3698a121e5bcd34a2e9b8772763abdd66c6ff93fc66d13df44cd531850412593156a86551915c59b4500b4a077c19671486b49c111edba4958ea37b337ac6318e0c6928f14c7c5b", 0xca, 0x7ff, 0x0, 0x3, r2}, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x2, 0x5, r5, &(0x7f0000001940)="5ac06c8a7f0cab9dc7e1c8cf5410b1487833d0197aa0480510ca6a492ad139bc42aaaa398bd781131036c58b249fa5784bf5b08684f1c8e8bcabc7362471ac211629714ea067c905b44823ef44b7afcdeb19ce3b61cc642148b2afe76fd4c35c82ada4f013aa1341d901c0", 0x6b, 0x10001, 0x0, 0x0, r2}, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x3, 0x7, r5, &(0x7f0000001a00)="881586a607af39dde2ef064bc0e46e9a58e480b37d681f96c45d5a2695afe671f277c9b23baeeb563ada2a2845dfa10ce589b42b289a92115a783e8b705b5fef920ad7", 0x43, 0xcd, 0x0, 0x2, r2}, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x6, 0xffff, r1, &(0x7f0000001ac0)="361d124f7d090365063a6523", 0xc, 0x4, 0x0, 0x1, r2}]) [ 757.893352] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 757.910162] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 757.910179] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000456957 [ 757.910187] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000200 [ 757.910199] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 09:29:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x7a00000000000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 757.918048] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 757.920045] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 757.920054] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x5000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:18 executing program 0 (fault-call:2 fault-nth:23): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x74000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 758.122804] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:29:18 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [{0x20, "766d6e657431e3276e6f6465765d5e6d643573756d2cbd707070317b2f277070703173797374656d2b707070312a"}, {0x20, '&['}, {0x20, "f5"}, {0x20, 'vboxnet0`'}, {0x20, 'md5sum:vboxnet1ppp0'}, {0x20, 'self'}, {0x20, 'em0/+!'}, {0x20, '!securitynodev#mime_type]em0vboxnet1'}, {}], 0xa, "338f3a726105acd03214c3de3dd00c8cca4610916af6c4c606638b87834b00dc4f67667534f89b2446c48417fd487c40dbee039008c57327b11f9847cce372f030434aa0349ac9efb6440896626c"}, 0xdd) 09:29:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1000000000000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 758.199052] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. 09:29:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xb5f, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 758.272011] FAULT_INJECTION: forcing a failure. [ 758.272011] name failslab, interval 1, probability 0, space 0, times 0 [ 758.283636] CPU: 1 PID: 11769 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 758.292160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.301516] Call Trace: [ 758.304117] dump_stack+0x244/0x3ab [ 758.307773] ? dump_stack_print_info.cold.2+0x52/0x52 [ 758.312979] ? debug_smp_processor_id+0x1c/0x20 [ 758.312997] ? perf_trace_lock+0x14d/0x7a0 09:29:18 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000040)=0x3ff0000000000, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40000, 0x0) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000440)="e45c86fffe69eef29069351271405911718ab44406a8fcf47d9b379c8d91aad0bfc39dfbfb74245c26358e89f1d50e6e246ed67e144c1045fc6ce3d4255ca281f8275c37840c452ef6b3546467faf5864e20f003cae06d4e760379f22ccc27efb35268d669a30d59f99a888a", 0x6c}], 0x1, &(0x7f00000004c0)=[@rights={0x38, 0x1, 0x1, [r1, r1, r1, r0, r0, r0, r1, r1, r1]}], 0x38, 0x8000}, 0xc000) r3 = getpgrp(0xffffffffffffffff) ptrace$peekuser(0x3, r3, 0x4a4) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x2100, 0x0) bind$inet(r4, &(0x7f0000000300)={0x2, 0x4e22, @multicast1}, 0x10) sync_file_range(r0, 0x6, 0x7, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000340)=""/254) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet6_opts(r5, 0x29, 0x3b, &(0x7f00000001c0)=""/148, &(0x7f0000000280)=0x94) [ 758.313017] should_fail.cold.4+0xa/0x17 [ 758.321903] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 758.331036] ? __save_stack_trace+0x8d/0xf0 [ 758.335375] ? save_stack+0xa9/0xd0 [ 758.339010] ? save_stack+0x43/0xd0 [ 758.342643] ? kasan_kmalloc+0xc7/0xe0 [ 758.346524] ? kasan_slab_alloc+0x12/0x20 [ 758.350669] ? __alloc_skb+0x114/0x770 [ 758.354564] ? alloc_uevent_skb+0x84/0x1da [ 758.358799] ? kobject_uevent_env+0xa52/0x101e [ 758.358812] ? kobject_uevent+0x1f/0x24 [ 758.358823] ? lo_ioctl+0x1385/0x1d60 09:29:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x6, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 758.358839] ? blkdev_ioctl+0x9ac/0x2010 [ 758.367383] ? lock_is_held_type+0x210/0x210 [ 758.379629] ? fs_reclaim_acquire+0x20/0x20 [ 758.383956] ? lock_downgrade+0x900/0x900 [ 758.388136] ? perf_trace_sched_process_exec+0x860/0x860 [ 758.393606] ? lock_downgrade+0x900/0x900 [ 758.397804] __should_failslab+0x124/0x180 [ 758.402045] should_failslab+0x9/0x14 [ 758.405868] kmem_cache_alloc_node_trace+0x270/0x740 [ 758.410989] ? kasan_unpoison_shadow+0x35/0x50 [ 758.415577] ? kasan_kmalloc+0xc7/0xe0 [ 758.419484] __kmalloc_node_track_caller+0x3c/0x70 [ 758.424424] __kmalloc_reserve.isra.40+0x41/0xe0 [ 758.429187] __alloc_skb+0x150/0x770 [ 758.429207] ? netdev_alloc_frag+0x1f0/0x1f0 [ 758.429226] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 758.437310] ? pointer+0x990/0x990 [ 758.437327] ? device_get_devnode+0x2d0/0x2d0 [ 758.437346] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 758.437364] ? netlink_has_listeners+0x2cb/0x4a0 [ 758.460013] ? netlink_tap_init_net+0x3d0/0x3d0 [ 758.464694] alloc_uevent_skb+0x84/0x1da [ 758.468779] kobject_uevent_env+0xa52/0x101e [ 758.473184] kobject_uevent+0x1f/0x24 [ 758.476971] lo_ioctl+0x1385/0x1d60 [ 758.480590] ? lo_rw_aio+0x1ef0/0x1ef0 [ 758.484488] blkdev_ioctl+0x9ac/0x2010 [ 758.488390] ? blkpg_ioctl+0xc10/0xc10 [ 758.492264] ? lock_downgrade+0x900/0x900 [ 758.496400] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 758.501404] ? save_stack+0x43/0xd0 [ 758.505023] ? __kasan_slab_free+0x102/0x150 [ 758.509427] ? __fget+0x4d1/0x740 [ 758.512898] ? ksys_dup3+0x680/0x680 [ 758.516610] block_ioctl+0xee/0x130 [ 758.520241] ? blkdev_fallocate+0x400/0x400 [ 758.524548] do_vfs_ioctl+0x1de/0x1720 [ 758.528424] ? trace_hardirqs_on+0xbd/0x310 [ 758.532737] ? ioctl_preallocate+0x300/0x300 [ 758.537145] ? __fget_light+0x2e9/0x430 [ 758.541101] ? fget_raw+0x20/0x20 [ 758.544563] ? putname+0xf2/0x130 [ 758.548004] ? kmem_cache_free+0x21a/0x290 [ 758.552220] ? putname+0xf7/0x130 [ 758.555659] ? do_sys_open+0x3ac/0x700 [ 758.559551] ? security_file_ioctl+0x94/0xc0 [ 758.563966] ksys_ioctl+0xa9/0xd0 [ 758.567415] __x64_sys_ioctl+0x73/0xb0 [ 758.571290] do_syscall_64+0x1b9/0x820 [ 758.575160] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 758.580520] ? syscall_return_slowpath+0x5e0/0x5e0 [ 758.585450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 758.590284] ? trace_hardirqs_on_caller+0x310/0x310 [ 758.595285] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 758.600411] ? prepare_exit_to_usermode+0x291/0x3b0 [ 758.605434] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 758.610268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 758.615445] RIP: 0033:0x457387 [ 758.618636] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 758.637529] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 758.645220] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 758.652474] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 758.659744] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 09:29:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x3f00, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x4c00000000000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:19 executing program 0 (fault-call:2 fault-nth:24): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x600000000000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 758.666996] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 758.674252] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 09:29:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x97ffffff, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:19 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x40, 0x88080) r2 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000200)=r2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000005c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000580)=0xfc) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000007c0)={r3, 0x2d4, "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"}, &(0x7f0000000300)=0x19e) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20a040, 0x0) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x7f) setsockopt(r4, 0x2, 0x10000000000, &(0x7f0000000180)="fba70622e0e491be1debde366564d532b56c25e947cbcd4ba7b5e19421ae1c8f49fb83e48f3f314d2fe653f66d3cecbefc7dd43faefd1c8355be329a58454a447662caa9cbdffea18a42b42f0cc1ec71686ef03e4519a9b8fa98", 0x5a) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) 09:29:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x700000000000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xffffff7f00000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 758.829258] FAULT_INJECTION: forcing a failure. [ 758.829258] name failslab, interval 1, probability 0, space 0, times 0 [ 758.862833] CPU: 0 PID: 11801 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 758.871358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.880829] Call Trace: [ 758.883428] dump_stack+0x244/0x3ab [ 758.887070] ? dump_stack_print_info.cold.2+0x52/0x52 [ 758.892257] ? debug_smp_processor_id+0x1c/0x20 [ 758.896938] ? perf_trace_lock+0x14d/0x7a0 [ 758.896955] should_fail.cold.4+0xa/0x17 [ 758.896973] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 758.910356] ? __save_stack_trace+0x8d/0xf0 [ 758.910383] ? save_stack+0xa9/0xd0 [ 758.918329] ? save_stack+0x43/0xd0 [ 758.921955] ? kasan_kmalloc+0xc7/0xe0 09:29:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x3f00, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xffffff9e, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x60000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 758.925843] ? kasan_slab_alloc+0x12/0x20 [ 758.929994] ? __alloc_skb+0x114/0x770 [ 758.930009] ? alloc_uevent_skb+0x84/0x1da [ 758.930021] ? kobject_uevent_env+0xa52/0x101e [ 758.930035] ? kobject_uevent+0x1f/0x24 [ 758.946671] ? lo_ioctl+0x1385/0x1d60 [ 758.946686] ? blkdev_ioctl+0x9ac/0x2010 [ 758.946702] ? lock_is_held_type+0x210/0x210 [ 758.946720] ? fs_reclaim_acquire+0x20/0x20 [ 758.963255] ? lock_downgrade+0x900/0x900 [ 758.967414] ? perf_trace_sched_process_exec+0x860/0x860 [ 758.972874] ? lock_downgrade+0x900/0x900 09:29:19 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000180)=0x1) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) [ 758.977037] __should_failslab+0x124/0x180 [ 758.981277] should_failslab+0x9/0x14 [ 758.985092] kmem_cache_alloc_node_trace+0x270/0x740 [ 758.990203] ? kasan_unpoison_shadow+0x35/0x50 [ 758.994795] ? kasan_kmalloc+0xc7/0xe0 [ 758.998702] __kmalloc_node_track_caller+0x3c/0x70 [ 759.003655] __kmalloc_reserve.isra.40+0x41/0xe0 [ 759.008435] __alloc_skb+0x150/0x770 [ 759.012164] ? netdev_alloc_frag+0x1f0/0x1f0 [ 759.016679] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 759.021620] ? pointer+0x990/0x990 [ 759.025169] ? device_get_devnode+0x2d0/0x2d0 [ 759.029660] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 759.034674] ? netlink_has_listeners+0x2cb/0x4a0 [ 759.039420] ? netlink_tap_init_net+0x3d0/0x3d0 [ 759.044076] alloc_uevent_skb+0x84/0x1da [ 759.048123] kobject_uevent_env+0xa52/0x101e [ 759.052520] kobject_uevent+0x1f/0x24 [ 759.056339] lo_ioctl+0x1385/0x1d60 [ 759.059963] ? lo_rw_aio+0x1ef0/0x1ef0 [ 759.063845] blkdev_ioctl+0x9ac/0x2010 [ 759.067726] ? blkpg_ioctl+0xc10/0xc10 [ 759.071704] ? lock_downgrade+0x900/0x900 [ 759.075854] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 759.080795] ? save_stack+0x43/0xd0 [ 759.084419] ? __kasan_slab_free+0x102/0x150 [ 759.088820] ? __fget+0x4d1/0x740 [ 759.092260] ? ksys_dup3+0x680/0x680 [ 759.095963] block_ioctl+0xee/0x130 [ 759.099575] ? blkdev_fallocate+0x400/0x400 [ 759.103881] do_vfs_ioctl+0x1de/0x1720 [ 759.107759] ? trace_hardirqs_on+0xbd/0x310 [ 759.112064] ? ioctl_preallocate+0x300/0x300 [ 759.116460] ? __fget_light+0x2e9/0x430 [ 759.120417] ? fget_raw+0x20/0x20 [ 759.123855] ? putname+0xf2/0x130 [ 759.127296] ? kmem_cache_free+0x21a/0x290 [ 759.131520] ? putname+0xf7/0x130 [ 759.134961] ? do_sys_open+0x3ac/0x700 [ 759.138840] ? security_file_ioctl+0x94/0xc0 [ 759.143236] ksys_ioctl+0xa9/0xd0 [ 759.146680] __x64_sys_ioctl+0x73/0xb0 [ 759.150566] do_syscall_64+0x1b9/0x820 [ 759.154464] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 759.159815] ? syscall_return_slowpath+0x5e0/0x5e0 [ 759.164732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 759.169562] ? trace_hardirqs_on_caller+0x310/0x310 [ 759.174562] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 759.179561] ? prepare_exit_to_usermode+0x291/0x3b0 [ 759.184574] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 759.189415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.194587] RIP: 0033:0x457387 [ 759.198026] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 759.217013] RSP: 002b:00007ff511a27a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 759.224888] RAX: ffffffffffffffda RBX: 00000000200024d0 RCX: 0000000000457387 [ 759.232141] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 759.239403] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 759.246758] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 759.254009] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 [ 759.264444] EXT4-fs: 25 callbacks suppressed [ 759.264455] EXT4-fs (sda1): re-mounted. Opts: ,errors=continue [ 759.332285] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 759.382948] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 759.392428] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:29:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x7a, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:20 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000001a40)="884d16807efd1a339826803cd706598584c8561cd25ce7a48c4999e4e8504d42b651fcb159d80f", 0x27) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000340)={'broute\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200100, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x2, 0x0) ioctl$NBD_SET_SOCK(r3, 0xab00, r0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r4, 0x0, 0x7, &(0x7f0000000400)='broute\x00', 0xffffffffffffffff}, 0x30) ptrace$peekuser(0x3, r5, 0x6) ioctl$sock_inet_SIOCRTMSG(r3, 0x890d, &(0x7f0000000200)={0x7, {0x2, 0x4e24, @multicast1}, {0x2, 0x4e22, @remote}, {0x2, 0x4e21, @rand_addr=0xfff}, 0x10, 0x8, 0x0, 0xffffffff, 0x4, &(0x7f00000001c0)='irlan0\x00', 0x1ff, 0x80000000, 0x3ff}) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000480)=""/141) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000016c0)={{{@in6=@ipv4={[], [], @rand_addr}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f00000017c0)=0xe8) r8 = getegid() getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000001800)={{{@in=@loopback, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001900)=0xe8) getgroups(0x2, &(0x7f0000001940)=[0xee00, 0xee01]) syz_emit_ethernet(0x5a, &(0x7f0000001a80)={@empty, @empty, [{[], {0x8100, 0x4, 0x9, 0x3}}], {@canfd={0xd, {{0x0, 0xfffffffffffffffa, 0x9, 0x2ad}, 0x13, 0x3, 0x0, 0x0, "79430cc5925674852b2d376b1be98b724576bed3ae3c22ea3cf6612a370f00ab58c4bd3681cc5503732e26f88fe1b2631983b694e293eb6a9bdbe5290fe3fd05"}}}}, &(0x7f0000001b00)={0x1, 0x1, [0xf, 0x4c, 0x9d3, 0x8d5]}) sendmsg$unix(r3, &(0x7f0000001a00)={&(0x7f0000000540)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000001680)=[{&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)="f1a2f9f3ea1d8476752f511e953a51a5d039de0e71135554180db2b492edccb71e309d96385f992f51d6115b1207868b91c7af453d1d47f36408b6a4e50fd4878b556cfb5b1851c6d5d60ad57aaf33965c48bfb20bab650cae79bb47c5c78e4898c89f57f8f82c57c8e041cc8ebf886e11bbc293f7c0ed5f8f1bdf54dcec129abc7301bb9184b2f94390d40038f74b0f606d79c288809c39a41419", 0x9b}], 0x2, &(0x7f0000001980)=[@cred={0x20, 0x1, 0x2, r5, r7, r8}, @cred={0x20, 0x1, 0x2, r5, r9, r10}, @rights={0x28, 0x1, 0x1, [r3, r6, r3, r4, r6]}], 0x68, 0x20000000}, 0x4000000) 09:29:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x20000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:20 executing program 0 (fault-call:2 fault-nth:25): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x68000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xfcffffff, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 759.464311] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:29:20 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x7, 0x4) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x100, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x9) 09:29:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfcfdffff00000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) [ 759.545034] FAULT_INJECTION: forcing a failure. [ 759.545034] name failslab, interval 1, probability 0, space 0, times 0 [ 759.564303] CPU: 1 PID: 11851 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 759.572834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 759.582188] Call Trace: [ 759.584794] dump_stack+0x244/0x3ab [ 759.588441] ? dump_stack_print_info.cold.2+0x52/0x52 09:29:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x700, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xfffffff0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 759.593648] ? debug_smp_processor_id+0x1c/0x20 [ 759.598329] ? perf_trace_lock+0x14d/0x7a0 [ 759.602600] should_fail.cold.4+0xa/0x17 [ 759.606676] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 759.611798] ? lock_is_held_type+0x210/0x210 [ 759.616213] ? save_stack+0xa9/0xd0 [ 759.619881] ? save_stack+0x43/0xd0 [ 759.623513] ? kasan_kmalloc+0xc7/0xe0 [ 759.627406] ? __kmalloc_track_caller+0x157/0x760 [ 759.632256] ? memdup_user+0x2c/0xa0 [ 759.635976] ? strndup_user+0x77/0xd0 [ 759.639785] ? ksys_mount+0x3c/0x140 09:29:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x7, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 759.643511] ? do_syscall_64+0x1b9/0x820 [ 759.647591] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.652965] ? trace_hardirqs_on+0x310/0x310 [ 759.657384] ? debug_check_no_obj_freed+0x305/0x58d [ 759.662409] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 759.667960] ? check_preemption_disabled+0x48/0x200 [ 759.672985] ? lock_is_held_type+0x210/0x210 [ 759.677403] ? fs_reclaim_acquire+0x20/0x20 [ 759.681732] ? lock_downgrade+0x900/0x900 [ 759.685917] ? perf_trace_sched_process_exec+0x860/0x860 [ 759.691379] ? lock_release+0xa10/0xa10 09:29:20 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) r0 = semget$private(0x0, 0x1, 0x402) semctl$SEM_STAT(r0, 0x3, 0x12, &(0x7f0000000040)=""/5) [ 759.695365] ? perf_trace_sched_process_exec+0x860/0x860 [ 759.700830] __should_failslab+0x124/0x180 [ 759.705066] should_failslab+0x9/0x14 [ 759.708888] __kmalloc_track_caller+0x2d1/0x760 [ 759.713593] ? strncpy_from_user+0x5a0/0x5a0 [ 759.718006] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 759.723548] ? strndup_user+0x77/0xd0 [ 759.727371] memdup_user+0x2c/0xa0 [ 759.730932] strndup_user+0x77/0xd0 [ 759.734563] ksys_mount+0x73/0x140 [ 759.738118] __x64_sys_mount+0xbe/0x150 [ 759.742103] do_syscall_64+0x1b9/0x820 [ 759.745987] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 759.751355] ? syscall_return_slowpath+0x5e0/0x5e0 [ 759.756288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 759.761164] ? trace_hardirqs_on_caller+0x310/0x310 [ 759.766191] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 759.771214] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 759.776781] ? prepare_exit_to_usermode+0x291/0x3b0 [ 759.781821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 759.786678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 759.791865] RIP: 0033:0x459f8a [ 759.791900] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 759.791908] RSP: 002b:00007ff511a27a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 759.813989] RAX: ffffffffffffffda RBX: 00007ff511a27b30 RCX: 0000000000459f8a [ 759.813999] RDX: 00007ff511a27ad0 RSI: 0000000020000200 RDI: 00007ff511a27af0 [ 759.814008] RBP: 0000000020000200 R08: 00007ff511a27b30 R09: 00007ff511a27ad0 [ 759.814016] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 759.814024] R13: 0000000000100020 R14: 00000000004d7d28 R15: 0000000000000003 [ 759.851518] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 759.897962] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 759.923079] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue 09:29:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x3, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:20 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x8000000006}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0xfffffffffffffffd, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000040)={0x6, [0x7, 0xffffffff00000001, 0x100, 0x9, 0x6, 0x0]}, 0x10) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000200)) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000240)=""/72) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) 09:29:20 executing program 0 (fault-call:2 fault-nth:26): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x700, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x7400000000000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:20 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40002, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000180)={0x1, 0x0, 'client0\x00', 0x4, "ccf8c28c7f0ccf7f", "20132422663abe35d78a0b7283eea068e576438803b5ad087bb52bad6e969e86", 0x6, 0x80000001}) mknod(&(0x7f0000000240)='./file0\x00', 0x9000, 0x200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) [ 760.031230] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 760.055896] FAULT_INJECTION: forcing a failure. [ 760.055896] name failslab, interval 1, probability 0, space 0, times 0 [ 760.073224] CPU: 1 PID: 11896 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 760.081735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.091086] Call Trace: [ 760.093686] dump_stack+0x244/0x3ab [ 760.097441] ? dump_stack_print_info.cold.2+0x52/0x52 [ 760.102640] ? debug_smp_processor_id+0x1c/0x20 [ 760.107329] ? perf_trace_lock+0x14d/0x7a0 [ 760.111555] should_fail.cold.4+0xa/0x17 [ 760.115602] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 760.120685] ? lock_is_held_type+0x210/0x210 [ 760.125077] ? save_stack+0xa9/0xd0 [ 760.128773] ? kasan_kmalloc+0xc7/0xe0 [ 760.132647] ? __kmalloc_track_caller+0x157/0x760 [ 760.137469] ? memdup_user+0x2c/0xa0 [ 760.141159] ? strndup_user+0x77/0xd0 [ 760.144959] ? ksys_mount+0x73/0x140 [ 760.148655] ? __x64_sys_mount+0xbe/0x150 [ 760.152787] ? do_syscall_64+0x1b9/0x820 [ 760.156837] ? trace_hardirqs_on+0x310/0x310 [ 760.161228] ? debug_check_no_obj_freed+0x305/0x58d [ 760.166225] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.171745] ? check_preemption_disabled+0x48/0x200 [ 760.176745] ? lock_is_held_type+0x210/0x210 [ 760.181152] ? fs_reclaim_acquire+0x20/0x20 [ 760.185459] ? lock_downgrade+0x900/0x900 [ 760.189589] ? perf_trace_sched_process_exec+0x860/0x860 [ 760.195020] ? lock_release+0xa10/0xa10 [ 760.198976] ? perf_trace_sched_process_exec+0x860/0x860 [ 760.204411] ? usercopy_warn+0x110/0x110 [ 760.208465] __should_failslab+0x124/0x180 [ 760.212702] should_failslab+0x9/0x14 [ 760.216486] kmem_cache_alloc_trace+0x2d7/0x750 [ 760.221140] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.226659] ? _copy_from_user+0xdf/0x150 [ 760.230789] copy_mount_options+0x5f/0x430 [ 760.235009] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 760.240537] ksys_mount+0xd0/0x140 [ 760.244059] __x64_sys_mount+0xbe/0x150 [ 760.248013] do_syscall_64+0x1b9/0x820 [ 760.251896] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 760.257255] ? syscall_return_slowpath+0x5e0/0x5e0 [ 760.262186] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 760.267035] ? trace_hardirqs_on_caller+0x310/0x310 [ 760.272031] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 760.277115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.282644] ? prepare_exit_to_usermode+0x291/0x3b0 [ 760.287653] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 760.292480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 760.297650] RIP: 0033:0x459f8a [ 760.300827] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 760.319720] RSP: 002b:00007ff511a27a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 760.327410] RAX: ffffffffffffffda RBX: 00007ff511a27b30 RCX: 0000000000459f8a [ 760.334672] RDX: 00007ff511a27ad0 RSI: 0000000020000200 RDI: 00007ff511a27af0 [ 760.341923] RBP: 0000000020000200 R08: 00007ff511a27b30 R09: 00007ff511a27ad0 [ 760.349175] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 760.356425] R13: 0000000000100020 R14: 00000000004d7d28 R15: 0000000000000003 09:29:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x9effffff00000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:21 executing program 0 (fault-call:2 fault-nth:27): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xfcfdffff, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:21 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) 09:29:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x600, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 760.518890] EXT4-fs (sda1): re-mounted. Opts: data_err=ignore,,errors=continue [ 760.533754] FAULT_INJECTION: forcing a failure. [ 760.533754] name failslab, interval 1, probability 0, space 0, times 0 [ 760.575268] CPU: 0 PID: 11931 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 760.583985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 760.583990] Call Trace: [ 760.584016] dump_stack+0x244/0x3ab [ 760.584036] ? dump_stack_print_info.cold.2+0x52/0x52 [ 760.584055] ? debug_smp_processor_id+0x1c/0x20 [ 760.584073] ? perf_trace_lock+0x14d/0x7a0 [ 760.584092] should_fail.cold.4+0xa/0x17 [ 760.584111] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 760.584128] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 760.584150] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 760.596092] ? rcu_softirq_qs+0x20/0x20 [ 760.596104] ? unwind_dump+0x190/0x190 [ 760.596127] ? kernel_text_address+0x79/0xf0 [ 760.604916] ? lock_is_held_type+0x210/0x210 [ 760.604937] ? fs_reclaim_acquire+0x20/0x20 [ 760.613814] ? lock_downgrade+0x900/0x900 [ 760.613836] ? perf_trace_sched_process_exec+0x860/0x860 [ 760.613848] ? save_stack+0xa9/0xd0 [ 760.613868] ? kmem_cache_alloc_trace+0x152/0x750 [ 760.627915] ? copy_mount_options+0x5f/0x430 [ 760.627934] __should_failslab+0x124/0x180 [ 760.627953] should_failslab+0x9/0x14 [ 760.645565] kmem_cache_alloc+0x2be/0x730 [ 760.645588] getname_flags+0xd0/0x590 [ 760.645605] user_path_at_empty+0x2d/0x50 [ 760.654312] do_mount+0x180/0x1d90 [ 760.654330] ? trace_hardirqs_on+0xbd/0x310 [ 760.654344] ? copy_mount_options+0x5f/0x430 [ 760.654358] ? copy_mount_string+0x40/0x40 [ 760.654374] ? kasan_unpoison_shadow+0x35/0x50 [ 760.663959] ? kasan_kmalloc+0xc7/0xe0 [ 760.663980] ? kmem_cache_alloc_trace+0x31f/0x750 [ 760.664006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.664022] ? copy_mount_options+0x315/0x430 [ 760.672458] ksys_mount+0x12d/0x140 [ 760.672501] __x64_sys_mount+0xbe/0x150 [ 760.672520] do_syscall_64+0x1b9/0x820 [ 760.672539] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 760.681145] ? syscall_return_slowpath+0x5e0/0x5e0 [ 760.681161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 760.681178] ? trace_hardirqs_on_caller+0x310/0x310 [ 760.681196] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 760.763369] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 760.763387] ? prepare_exit_to_usermode+0x291/0x3b0 [ 760.763403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 760.763421] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 760.773414] RIP: 0033:0x459f8a [ 760.773430] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 760.773439] RSP: 002b:00007ff511a27a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 09:29:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:21 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x100000000, 0x1, [0x8]}, &(0x7f0000000180)=0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000240)=@ethtool_stats={0x2}}) close(r4) close(r3) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) sched_setscheduler(r5, 0x0, &(0x7f0000000280)=0x2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={r1, 0x4, 0x4, [0x5, 0xfffffffffffff49a, 0x7, 0x2]}, &(0x7f0000000200)=0x10) 09:29:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x6800, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x600, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x2000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 760.773454] RAX: ffffffffffffffda RBX: 00007ff511a27b30 RCX: 0000000000459f8a [ 760.773462] RDX: 00007ff511a27ad0 RSI: 0000000020000200 RDI: 00007ff511a27af0 [ 760.773474] RBP: 0000000020000200 R08: 00007ff511a27b30 R09: 00007ff511a27ad0 [ 760.845604] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 760.852880] R13: 0000000000100020 R14: 00000000004d7d28 R15: 0000000000000003 09:29:21 executing program 0 (fault-call:2 fault-nth:28): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x7a, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x20000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:21 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) 09:29:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xf0ffff, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 761.023845] FAULT_INJECTION: forcing a failure. [ 761.023845] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 761.036043] CPU: 1 PID: 11979 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 761.044532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.053914] Call Trace: [ 761.056510] dump_stack+0x244/0x3ab [ 761.060169] ? dump_stack_print_info.cold.2+0x52/0x52 [ 761.065370] ? find_get_entries_tag+0x1400/0x1400 09:29:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xffffff7f00000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:21 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x3, 0x0) setsockopt$inet_buf(r0, 0x0, 0x26, &(0x7f0000000180)="16a8b6c5bc1d02e1f23455d7f73aee5205ea3387ee488a3dc941a404d5e5e68b22926b17b4bb6fbb34b65ff57122f098078116146aaadac41ea3d3310fc98f571d09dbb6b949a56089f03a", 0x4b) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) [ 761.070249] ? mark_held_locks+0x130/0x130 [ 761.074514] should_fail.cold.4+0xa/0x17 [ 761.078577] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 761.078597] ? lock_is_held_type+0x210/0x210 [ 761.088094] ? mark_held_locks+0x130/0x130 [ 761.092352] ? lock_is_held_type+0x210/0x210 [ 761.096818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.102486] ? check_preemption_disabled+0x48/0x200 [ 761.107510] ? debug_smp_processor_id+0x1c/0x20 [ 761.112179] ? perf_trace_lock+0x14d/0x7a0 [ 761.116433] ? lock_is_held_type+0x210/0x210 [ 761.121033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.126575] ? should_fail+0x22d/0xd01 [ 761.130488] ? lock_is_held_type+0x210/0x210 [ 761.134914] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 761.140038] __alloc_pages_nodemask+0x34b/0xdd0 [ 761.144722] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 761.150020] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 761.155053] ? kernel_text_address+0x79/0xf0 [ 761.159487] ? fs_reclaim_acquire+0x20/0x20 [ 761.163819] ? lock_downgrade+0x900/0x900 [ 761.168000] ? trace_hardirqs_off+0xb8/0x310 [ 761.172434] cache_grow_begin+0xa5/0x8c0 [ 761.176536] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 761.182104] ? check_preemption_disabled+0x48/0x200 [ 761.182124] kmem_cache_alloc+0x66b/0x730 [ 761.191294] getname_flags+0xd0/0x590 [ 761.195557] user_path_at_empty+0x2d/0x50 [ 761.199707] do_mount+0x180/0x1d90 [ 761.199724] ? trace_hardirqs_on+0xbd/0x310 [ 761.199740] ? copy_mount_options+0x5f/0x430 [ 761.211980] ? copy_mount_string+0x40/0x40 [ 761.216226] ? kasan_unpoison_shadow+0x35/0x50 [ 761.216242] ? kasan_kmalloc+0xc7/0xe0 [ 761.224722] ? kmem_cache_alloc_trace+0x31f/0x750 [ 761.229579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.229592] ? copy_mount_options+0x315/0x430 [ 761.229608] ksys_mount+0x12d/0x140 [ 761.239617] __x64_sys_mount+0xbe/0x150 [ 761.239636] do_syscall_64+0x1b9/0x820 [ 761.239653] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 761.247246] ? syscall_return_slowpath+0x5e0/0x5e0 [ 761.247260] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 761.247280] ? trace_hardirqs_on_caller+0x310/0x310 [ 761.256498] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 761.256528] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.256543] ? prepare_exit_to_usermode+0x291/0x3b0 [ 761.256560] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 761.256577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.256590] RIP: 0033:0x459f8a [ 761.266327] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 761.266337] RSP: 002b:00007ff511a27a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 761.266356] RAX: ffffffffffffffda RBX: 00007ff511a27b30 RCX: 0000000000459f8a [ 761.276355] RDX: 00007ff511a27ad0 RSI: 0000000020000200 RDI: 00007ff511a27af0 [ 761.276364] RBP: 0000000020000200 R08: 00007ff511a27b30 R09: 00007ff511a27ad0 [ 761.276373] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 761.276382] R13: 0000000000100020 R14: 00000000004d7d28 R15: 0000000000000003 09:29:22 executing program 1: perf_event_open(&(0x7f000025c000)={0x5, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) 09:29:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xfcffffff00000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:22 executing program 0 (fault-call:2 fault-nth:29): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)) 09:29:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x4800, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x5000000, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0xffffff97, &(0x7f00000024c0), 0x100020, &(0x7f0000000080)={[{@data_err_ignore='data_err=ignore'}]}) 09:29:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0x48000000, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:22 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x280, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000180)='cgroup.type\x00', 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) waitid(0x0, r2, &(0x7f0000000240), 0x4000000d, &(0x7f0000000280)) [ 761.569142] FAULT_INJECTION: forcing a failure. [ 761.569142] name failslab, interval 1, probability 0, space 0, times 0 [ 761.687497] CPU: 0 PID: 12018 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 761.696168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.705629] Call Trace: [ 761.708232] dump_stack+0x244/0x3ab [ 761.711877] ? dump_stack_print_info.cold.2+0x52/0x52 [ 761.711899] ? debug_smp_processor_id+0x1c/0x20 [ 761.721753] ? perf_trace_lock+0x14d/0x7a0 [ 761.721770] should_fail.cold.4+0xa/0x17 [ 761.721787] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 761.735230] ? mntput+0x74/0xa0 [ 761.738512] ? trace_hardirqs_off+0xb8/0x310 [ 761.738527] ? trace_hardirqs_on+0x310/0x310 [ 761.738545] ? debug_check_no_obj_freed+0x305/0x58d [ 761.752454] ? check_preemption_disabled+0x48/0x200 [ 761.757484] ? trace_hardirqs_on+0xbd/0x310 [ 761.761821] ? lock_is_held_type+0x210/0x210 [ 761.766242] ? fs_reclaim_acquire+0x20/0x20 [ 761.770591] ? lock_downgrade+0x900/0x900 [ 761.774745] ? filename_lookup+0x39f/0x520 [ 761.774762] ? perf_trace_sched_process_exec+0x860/0x860 [ 761.774782] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 761.784442] __should_failslab+0x124/0x180 [ 761.784456] should_failslab+0x9/0x14 [ 761.784488] kmem_cache_alloc_trace+0x2d7/0x750 [ 761.784505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.784522] vfs_new_fs_context+0x5e/0x77c [ 761.784536] ? ns_capable_common+0x13f/0x170 [ 761.784553] do_mount+0xb70/0x1d90 [ 761.784570] ? copy_mount_string+0x40/0x40 [ 761.784580] ? kasan_unpoison_shadow+0x35/0x50 [ 761.784595] ? kasan_kmalloc+0xc7/0xe0 [ 761.829272] ? kmem_cache_alloc_trace+0x31f/0x750 [ 761.829292] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 761.829311] ? _copy_from_user+0xdf/0x150 [ 761.838019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.838034] ? copy_mount_options+0x315/0x430 [ 761.838050] ksys_mount+0x12d/0x140 [ 761.838065] __x64_sys_mount+0xbe/0x150 [ 761.847742] do_syscall_64+0x1b9/0x820 [ 761.847761] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 761.857778] ? syscall_return_slowpath+0x5e0/0x5e0 [ 761.857794] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 761.857813] ? trace_hardirqs_on_caller+0x310/0x310 [ 761.889415] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 761.894449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 761.900087] ? prepare_exit_to_usermode+0x291/0x3b0 [ 761.905224] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 761.910187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 761.915378] RIP: 0033:0x459f8a [ 761.918592] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 09:29:22 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) getrandom(&(0x7f0000000180)=""/201, 0xc9, 0x1) 09:29:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xf0ffffff, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) 09:29:22 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000180)='cgroup\\#\x00', &(0x7f00000001c0)="1a00", &(0x7f0000000200)='%\\\x00', &(0x7f0000000240)='keyring\x00', &(0x7f0000000280)='ppp1cpuset/\x00', &(0x7f00000002c0)=':-bdevwlan1GPLcgroupGPLposix_acl_access\x00', &(0x7f0000000300)=')@\x00', &(0x7f0000000340)='+keyring\x00'], &(0x7f00000005c0)=[&(0x7f00000003c0)='\x00', &(0x7f0000000400)='*\x00', &(0x7f0000000440)='#/ppp0+\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='proc\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='systemeth1ppp1y\x00', &(0x7f0000000580)='#systemposix_acl_accessmime_type\x00']) unlink(&(0x7f0000000640)='./file0\x00') semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000080)=""/254) r0 = syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x131f, 0x10000) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x466) 09:29:22 executing program 1: r0 = dup(0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000080)=0x3) r1 = shmget(0x2, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x40200, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r0, &(0x7f00000003c0)="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"}, 0x10) r2 = semget$private(0x0, 0x0, 0x10) semctl$GETALL(r2, 0x0, 0xd, &(0x7f00000002c0)=""/254) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x8000, 0x4000) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000100)) ioctl$VT_WAITACTIVE(r3, 0x5607) 09:29:22 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xed0000200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, r0, 0x0) r1 = semget(0x0, 0x3, 0xa) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) migrate_pages(r2, 0x3, &(0x7f00000001c0)=0x1f, &(0x7f0000000200)=0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000240), &(0x7f0000000280)=0xc) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000080)=""/254) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000300)={0x200, 0x2, 0x4, 0x0, 0x0, [], [], [], 0x100000000, 0x5}) 09:29:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x3407a}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x1c, 0x32, 0x829, 0x0, 0xf0, {0x3, 0xf000}, [@typed={0x8, 0x0, @pid}]}, 0x1c}}, 0x0) [ 761.937507] RSP: 002b:00007ff511a27a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 761.945230] RAX: ffffffffffffffda RBX: 00007ff511a27b30 RCX: 0000000000459f8a [ 761.952508] RDX: 00007ff511a27ad0 RSI: 0000000020000200 RDI: 00007ff511a27af0 [ 761.959787] RBP: 0000000020000200 R08: 00007ff511a27b30 R09: 00007ff511a27ad0 [ 761.967063] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 761.974338] R13: 0000000000100020 R14: 00000000004d7d28 R15: 0000000000000003 [ 761.983226] BUG: unable to handle kernel paging request at fffffffffffffff4 [ 761.986555] kobject: 'loop5' (00000000b47aaede): kobject_uevent_env [ 761.990339] PGD 926d067 P4D 926d067 PUD 926f067 PMD 0 [ 761.990369] Oops: 0000 [#1] PREEMPT SMP KASAN [ 761.990393] CPU: 0 PID: 12018 Comm: syz-executor0 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 761.990400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 761.990419] RIP: 0010:do_mount+0xb98/0x1d90 [ 761.990434] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 761.990443] RSP: 0018:ffff88017f0d7c28 EFLAGS: 00010246 [ 761.990456] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90001e6a000 [ 761.990466] RDX: 1ffffffffffffffe RSI: ffffffff81e08e2c RDI: ffffffff89703f00 [ 761.990476] RBP: ffff88017f0d7db0 R08: ffff880187c8c6c0 R09: fffffbfff1287122 [ 761.990485] R10: fffffbfff1287122 R11: ffffffff89438913 R12: ffff8801c105fa30 [ 761.990495] R13: ffff8801c9fe2ac0 R14: ffff8801c9fe2ac0 R15: ffff8801bfd525c0 [ 761.990507] FS: 00007ff511a28700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 761.990517] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 761.990526] CR2: fffffffffffffff4 CR3: 00000001d7b02000 CR4: 00000000001406f0 [ 761.990537] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 761.990549] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 762.008029] kobject: 'loop2' (000000000f5b1c3d): kobject_uevent_env [ 762.015276] Call Trace: [ 762.015302] ? copy_mount_string+0x40/0x40 [ 762.015320] ? kasan_unpoison_shadow+0x35/0x50 [ 762.031505] kobject: 'loop5' (00000000b47aaede): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 762.047963] ? kasan_kmalloc+0xc7/0xe0 [ 762.047986] ? kmem_cache_alloc_trace+0x31f/0x750 [ 762.048003] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 762.048018] ? _copy_from_user+0xdf/0x150 [ 762.048037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.066103] __nla_parse: 27 callbacks suppressed [ 762.066112] netlink: 4 bytes leftover after parsing attributes in process `syz-executor2'. [ 762.067929] ? copy_mount_options+0x315/0x430 [ 762.067948] ksys_mount+0x12d/0x140 [ 762.067966] __x64_sys_mount+0xbe/0x150 [ 762.075656] kobject: 'loop2' (000000000f5b1c3d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 762.082493] do_syscall_64+0x1b9/0x820 [ 762.082510] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 762.082528] ? syscall_return_slowpath+0x5e0/0x5e0 [ 762.225426] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 762.230272] ? trace_hardirqs_on_caller+0x310/0x310 [ 762.235296] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 762.240305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 762.245827] ? prepare_exit_to_usermode+0x291/0x3b0 [ 762.250853] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 762.255686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 762.260860] RIP: 0033:0x459f8a [ 762.264040] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 762.282938] RSP: 002b:00007ff511a27a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 762.290634] RAX: ffffffffffffffda RBX: 00007ff511a27b30 RCX: 0000000000459f8a [ 762.297885] RDX: 00007ff511a27ad0 RSI: 0000000020000200 RDI: 00007ff511a27af0 [ 762.305144] RBP: 0000000020000200 R08: 00007ff511a27b30 R09: 00007ff511a27ad0 [ 762.312400] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 762.319656] R13: 0000000000100020 R14: 00000000004d7d28 R15: 0000000000000003 [ 762.326943] Modules linked in: [ 762.330137] CR2: fffffffffffffff4 [ 762.333587] ---[ end trace cc1474f7ce164931 ]--- [ 762.338365] RIP: 0010:do_mount+0xb98/0x1d90 [ 762.342672] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 762.350964] kobject: 'loop0' (000000002b986358): kobject_uevent_env [ 762.361561] RSP: 0018:ffff88017f0d7c28 EFLAGS: 00010246 [ 762.361574] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90001e6a000 [ 762.361583] RDX: 1ffffffffffffffe RSI: ffffffff81e08e2c RDI: ffffffff89703f00 [ 762.361596] RBP: ffff88017f0d7db0 R08: ffff880187c8c6c0 R09: fffffbfff1287122 [ 762.368198] kobject: 'loop0' (000000002b986358): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 762.373340] R10: fffffbfff1287122 R11: ffffffff89438913 R12: ffff8801c105fa30 [ 762.373349] R13: ffff8801c9fe2ac0 R14: ffff8801c9fe2ac0 R15: ffff8801bfd525c0 [ 762.373370] FS: 00007ff511a28700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 762.373380] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 762.373389] CR2: fffffffffffffff4 CR3: 00000001d7b02000 CR4: 00000000001406f0 [ 762.373401] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 762.373409] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 762.373419] Kernel panic - not syncing: Fatal exception [ 762.461636] Kernel Offset: disabled [ 762.465264] Rebooting in 86400 seconds..