nux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) getsockname$packet(r17, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r18}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r18, r15}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) syz_mount_image$tmpfs(&(0x7f0000000600)='tmpfs\x00', &(0x7f0000000640)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000680)="ca278a2aad5084b0d15f3df1e9a4f40e0bc29505e1a4f2e81d61156c9c2898b7279336e4169dd4cd14c5888f0af102f92429ec6686dab2d312ffbc3adb38925a72e267ec39a3e41f4050b09a4ac8dc9471f3f297db32a2aed41e0a65864a425776c360d5af5957ed2ff2e145e8a99e45d7d5a5db94cfab8fefc35ba3a3c828a76947b234ca6f8a0ea1b36a2c", 0x8c, 0xffffffffffffd02e}, {&(0x7f0000000740)="2c85629d40ea782e9b79fc0599c59f26974a4845b0b0a323c12974f99a85aa94ac82243fac986978b7b2a1db08d9f3178ed1e33c7ae46c977074a6967453e73b8cf69d72193e5153510a5da3f61c04a263c3ceffe7d74381b83a69e584eca63f0dbc20b7063220bb431b286a0d30023b3becea771105c443a6f5825883b169020af020dc669134c19ea02c2f19521cc5531b8adfe6a367695a145f71c0581b11a82666e31b75d75cc94b8989f1355ee128c1c73e882dcfdbdc575b4b447f8a2f64c27d6e0e8b38ac05c82e8e07de1136364dd768c604f8d725665baab711ee82a1", 0xe1, 0x5}, {&(0x7f0000000840)="ffd89c27f9f9e61a95a2d06ddf05ab168c268e88700785e3001d", 0x1a, 0x71}], 0x1000040, &(0x7f0000000900)={[{@nr_inodes={'nr_inodes', 0x3d, [0x32]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x3, 0x38, 0x2d, 0x25]}}, {@huge_advise={'huge=advise', 0x3d, 'selinuxself--)*'}}], [{@subj_user={'subj_user', 0x3d, 'systemvmnet0:'}}, {@obj_role={'obj_role', 0x3d, '/#\'wlan0'}}, {@subj_user={'subj_user', 0x3d, 'data=journal'}}, {@fowner_eq={'fowner', 0x3d, r15}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@smackfsdef={'smackfsdef', 0x3d, 'eth0+selinuxvmnet1em1cpusetselinux'}}]}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000400)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000100)='.\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x2}, {0x2, 0x2, r2}, {0x2, 0x6, r6}, {0x2, 0x5, r8}], {0x4, 0x2}, [{0x8, 0x0, r12}, {0x8, 0x5, 0xee00}, {0x8, 0x4, r13}, {0x8, 0x2, r19}], {0x10, 0x2}}, 0x64, 0x3) 08:53:19 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x7}) [ 287.932975][T25059] tmpfs: Bad value for 'nr_inodes' 08:53:19 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x9003}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:19 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x8}) 08:53:19 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r5}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r5, r2}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r10, r8, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r7, r10) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) r11 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r15}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r15, r12}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) syz_mount_image$tmpfs(&(0x7f0000000600)='tmpfs\x00', &(0x7f0000000640)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000680)="ca278a2aad5084b0d15f3df1e9a4f40e0bc29505e1a4f2e81d61156c9c2898b7279336e4169dd4cd14c5888f0af102f92429ec6686dab2d312ffbc3adb38925a72e267ec39a3e41f4050b09a4ac8dc9471f3f297db32a2aed41e0a65864a425776c360d5af5957ed2ff2e145e8a99e45d7d5a5db94cfab8fefc35ba3a3c828a76947b234ca6f8a0ea1b36a2c", 0x8c, 0xffffffffffffd02e}, {&(0x7f0000000740)="2c85629d40ea782e9b79fc0599c59f26974a4845b0b0a323c12974f99a85aa94ac82243fac986978b7b2a1db08d9f3178ed1e33c7ae46c977074a6967453e73b8cf69d72193e5153510a5da3f61c04a263c3ceffe7d74381b83a69e584eca63f0dbc20b7063220bb431b286a0d30023b3becea771105c443a6f5825883b169020af020dc669134c19ea02c2f19521cc5531b8adfe6a367695a145f71c0581b11a82666e31b75d75cc94b8989f1355ee128c1c73e882dcfdbdc575b4b447f8a2f64c27d6e0e8b38ac05c82e8e07de1136364dd768c604f8d725665baab711ee82a1", 0xe1, 0x5}, {&(0x7f0000000840)="ffd89c27f9f9e61a95a2d06ddf05ab168c268e88700785e3001d", 0x1a, 0x71}], 0x1000040, &(0x7f0000000900)={[{@nr_inodes={'nr_inodes', 0x3d, [0x32]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x3, 0x38, 0x2d, 0x25]}}, {@huge_advise={'huge=advise', 0x3d, 'selinuxself--)*'}}], [{@subj_user={'subj_user', 0x3d, 'systemvmnet0:'}}, {@obj_role={'obj_role', 0x3d, '/#\'wlan0'}}, {@subj_user={'subj_user', 0x3d, 'data=journal'}}, {@fowner_eq={'fowner', 0x3d, r12}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@smackfsdef={'smackfsdef', 0x3d, 'eth0+selinuxvmnet1em1cpusetselinux'}}]}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) [ 288.213226][T25099] tmpfs: Bad value for 'nr_inodes' 08:53:20 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x28f5c}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:20 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x9}) 08:53:20 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r9, r7, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r6, r9) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r14}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r14, r11}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) syz_mount_image$tmpfs(&(0x7f0000000600)='tmpfs\x00', &(0x7f0000000640)='./file0\x00', 0x8001, 0x3, &(0x7f0000000880)=[{&(0x7f0000000680)="ca278a2aad5084b0d15f3df1e9a4f40e0bc29505e1a4f2e81d61156c9c2898b7279336e4169dd4cd14c5888f0af102f92429ec6686dab2d312ffbc3adb38925a72e267ec39a3e41f4050b09a4ac8dc9471f3f297db32a2aed41e0a65864a425776c360d5af5957ed2ff2e145e8a99e45d7d5a5db94cfab8fefc35ba3a3c828a76947b234ca6f8a0ea1b36a2c", 0x8c, 0xffffffffffffd02e}, {&(0x7f0000000740)="2c85629d40ea782e9b79fc0599c59f26974a4845b0b0a323c12974f99a85aa94ac82243fac986978b7b2a1db08d9f3178ed1e33c7ae46c977074a6967453e73b8cf69d72193e5153510a5da3f61c04a263c3ceffe7d74381b83a69e584eca63f0dbc20b7063220bb431b286a0d30023b3becea771105c443a6f5825883b169020af020dc669134c19ea02c2f19521cc5531b8adfe6a367695a145f71c0581b11a82666e31b75d75cc94b8989f1355ee128c1c73e882dcfdbdc575b4b447f8a2f64c27d6e0e8b38ac05c82e8e07de1136364dd768c604f8d725665baab711ee82a1", 0xe1, 0x5}, {&(0x7f0000000840)="ffd89c27f9f9e61a95a2d06ddf05ab168c268e88700785e3001d", 0x1a, 0x71}], 0x1000040, &(0x7f0000000900)={[{@nr_inodes={'nr_inodes', 0x3d, [0x32]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x3, 0x38, 0x2d, 0x25]}}, {@huge_advise={'huge=advise', 0x3d, 'selinuxself--)*'}}], [{@subj_user={'subj_user', 0x3d, 'systemvmnet0:'}}, {@obj_role={'obj_role', 0x3d, '/#\'wlan0'}}, {@subj_user={'subj_user', 0x3d, 'data=journal'}}, {@fowner_eq={'fowner', 0x3d, r11}}, {@fsmagic={'fsmagic', 0x3d, 0x8}}, {@smackfsdef={'smackfsdef', 0x3d, 'eth0+selinuxvmnet1em1cpusetselinux'}}]}) [ 288.518300][T25130] tmpfs: Bad value for 'nr_inodes' 08:53:20 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x40000}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:20 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r9, r7, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r6, r9) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) getsockname$packet(r13, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r14}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r14, r11}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) 08:53:20 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0xa}) 08:53:20 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0xcb85e}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:20 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r9, r7, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r6, r9) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) getsockname$packet(r12, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r13}, 0x3c) 08:53:20 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0xb}) 08:53:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x1000000}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:21 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0xc}) 08:53:21 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:21 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r9, r7, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r6, r9) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) getsockname$packet(r12, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) [ 289.344707][T25200] limit_mt_check: 19 callbacks suppressed [ 289.344715][T25200] xt_limit: Overflow, try lower: 620756992/18944 [ 289.479000][T25211] xt_limit: Overflow, try lower: 620756992/18944 08:53:21 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x2000000}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:21 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r9, r7, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r6, r9) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r11) 08:53:21 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0xd}) [ 289.730960][T25228] xt_limit: Overflow, try lower: 620756992/18944 [ 289.849909][T25237] xt_limit: Overflow, try lower: 620756992/18944 08:53:21 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x3000000}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:21 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r9, r7, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r6, r9) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) 08:53:21 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0xe}) 08:53:21 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r9, r7, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r6, r9) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) [ 290.024516][T25249] xt_limit: Overflow, try lower: 620756992/18944 [ 290.034311][T25255] xt_limit: Overflow, try lower: 620756992/18944 08:53:22 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2401000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x6000000}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:22 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r9, r7, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r6, r9) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) [ 290.220654][T25267] xt_limit: Overflow, try lower: 620756992/18944 [ 290.289970][T25281] xt_limit: Overflow, try lower: 620756992/18944 [ 290.411035][T25282] xt_limit: Overflow, try lower: 620756992/18944 08:53:22 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x8000000}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:22 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x10}) 08:53:22 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r9, r7, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r6, r9) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) [ 290.669679][T25304] xt_limit: Overflow, try lower: 620756992/18944 08:53:22 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000080000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x30020000}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:22 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r9, r7, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r6, r9) 08:53:22 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x11}) 08:53:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x40000000}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:23 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:23 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r8, r6, 0x0) 08:53:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x58010000}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:23 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:23 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x12}) 08:53:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x5c8f0200}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:23 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) [ 291.620565][T25369] EXT4-fs: 46 callbacks suppressed [ 291.620573][T25369] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 291.671227][T25369] EXT4-fs (sda1): re-mounted. Opts: data=journal, [ 291.689823][T25373] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 291.820676][T25385] EXT4-fs (sda1): Unrecognized mount option "" or missing value 08:53:23 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x40d4010000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x5eb80c00}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:23 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) getgroups(0x1, &(0x7f00000000c0)=[0x0]) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) 08:53:23 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x22}) 08:53:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x90030000}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 291.953813][T25392] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 291.979994][T25392] EXT4-fs (sda1): re-mounted. Opts: data=journal, [ 292.058090][T25401] EXT4-fs (sda1): Unrecognized mount option """ or missing value 08:53:24 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2b00000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:24 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) getgroups(0x1, &(0x7f00000000c0)=[0x0]) 08:53:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 292.183808][T25414] EXT4-fs (sda1): Unrecognized mount option """ or missing value [ 292.262355][T25421] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 292.291634][T25421] EXT4-fs (sda1): re-mounted. Opts: data=journal, 08:53:24 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:24 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x2e}) 08:53:24 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) 08:53:24 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:24 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@loopback, @in6}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000002c0)=0xe8) 08:53:24 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x48}) 08:53:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:25 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x2e00000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:25 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:25 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:25 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x4c}) 08:53:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:25 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() socket$inet_tcp(0x2, 0x1, 0x0) 08:53:25 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:25 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) geteuid() 08:53:25 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x68}) 08:53:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:26 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x3c04000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:26 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r4}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r4, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) 08:53:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:26 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:26 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x6c}) 08:53:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:26 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r3}, 0x3c) [ 294.453564][T25576] limit_mt_check: 24 callbacks suppressed [ 294.453569][T25576] xt_limit: Overflow, try lower: 620756992/18944 08:53:26 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x3, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:26 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) 08:53:26 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x74}) 08:53:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x8, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 294.826822][T25601] xt_limit: Overflow, try lower: 620756992/18944 [ 294.901987][T25611] xt_limit: Overflow, try lower: 620756992/18944 08:53:27 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x3d04000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0xa, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:27 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) [ 295.115208][T25625] xt_limit: Overflow, try lower: 620756992/18944 08:53:27 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:27 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0x7a}) 08:53:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:27 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) [ 295.399700][T25649] xt_limit: Overflow, try lower: 620756992/18944 08:53:27 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x2, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:27 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f00000003c0)=0xc) 08:53:27 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [], 0xff}) 08:53:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x3, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 295.781321][T25674] xt_limit: Overflow, try lower: 620756992/18944 [ 295.873314][T25684] xt_limit: Overflow, try lower: 620756992/18944 08:53:27 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x3f9925267e770000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x4, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:27 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) [ 296.094570][T25703] xt_limit: Overflow, try lower: 620756992/18944 08:53:28 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:28 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB="e4186933b8314f"], &(0x7f0000000180)='./file0\x00', 0x0, 0x3ae5025, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x3) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r0 = socket$netlink(0x10, 0x3, 0x3) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x8, 0x4) 08:53:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x6, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:28 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) [ 296.335973][T25717] xt_limit: Overflow, try lower: 620756992/18944 08:53:28 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x8, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:28 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001540)=ANY=[@ANYBLOB="4dc88cd6b7b925b0996178cbf240754cd6da24fb3f5469bbf76d94d0f650903a6416f5f138ed51de7ad858b8a7060cc03776c500d3015c3023599d54e732380de6c6b411b3561a5a421f206e49a4fd9edb3445f98bc8e886d15ec0de8754549c8efe03c3760263c852386bc0c1cf0a7c97035a8af081665ad02d7c788a7ec91dbf0c956d7da4859965984a2d420b0ad99d62964d6d17712a11f5c7b44e7020cf9a9e9a6bb9e420a4b58c959ad9ba6d7de2585350626b97da54233344b8db06baa587d5e4336f13da927d10a169dceaeaa8b1df"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000001400)=ANY=[@ANYBLOB="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"]) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r5}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r5, r1}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000140)=[{&(0x7f00000001c0)="52984a7d06417796b1e64f25579271dcc27456c97a117f430ff85953b3187a111bbd8c585a8fd6a92fa70a4aeba0f75707ef1168037d0f7bb45c4b3c601973cfc30b1691466bc592a48464c196d97ba747a0936b97770e1dc9dd4fced9d7f959fa54e104790ae31984836b3efced2ac447ed1238d813c9a81e7fd9b8970ce78ede9f9b2f9c6b24a96e2550c86b7282a5df1f5160395d337ac76a500bf878f9adbb448120e4e96e16865616d8ec45ffc2", 0xb0, 0x3}, {&(0x7f0000000280)="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", 0x1000, 0x10000}], 0x100c0, &(0x7f0000001380)={[{@uni_xlate='uni_xlate=1'}], [{@fowner_gt={'fowner>', r1}}, {@uid_lt={'uid<'}}, {@measure='measure'}, {@smackfsroot={'smackfsroot'}}, {@dont_measure='dont_measure'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@seclabel='seclabel'}]}) fcntl$getownex(r2, 0x10, &(0x7f0000001280)) 08:53:28 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x158, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 296.726822][T25741] xt_limit: Overflow, try lower: 620756992/18944 [ 296.765262][T25743] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 08:53:28 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:28 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) [ 296.942889][T25762] FAT-fs (loop2): Unrecognized mount option "fowner>00000000000000000000" or missing value 08:53:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x230, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:29 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:29 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0xfb, 0x1, 0x7, "056a614179e34eb411bca705d0a8daf8", "3245b3de7fffc6eae8e61ee3514b79540bbfec2ba6620a665d2450a07035dfc0c47cf21306e71dc4277d89bb562d0067e96bebd703f305a36da5e384d9b8a51aa413da80811d87887ffc6016a098df1f07ffb28d1a1d5311b5b418b6b9b9b4463f3bdaabcb7b018bfc7a3d7b24b040662632a460aacbbf33159db2299aa2ab6ef8e363bc0aaf05d89b5046fed8f60e387f72256b7dc603d2b79f5f0c5320b330129f2f90ede081d585e07d2d1e7e0e70a6697e2293776b5a8d10566c1723f219253214c6831eb4d3a3ba340e921c7af2fae488b8c0cdcc01a26051d7914ca225cfe2f5309d0f"}, 0xfb, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) 08:53:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x300, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:29 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) [ 297.355762][T25789] EXT4-fs: 42 callbacks suppressed [ 297.355772][T25789] EXT4-fs (sda1): Unrecognized mount option "auto_da_allog=0x000ª21éf.¯MH00000000000c0" or missing value 08:53:29 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x390, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:29 executing program 0: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:29 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000140), &(0x7f00000001c0)=0x8) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$packet_buf(r2, 0x107, 0x3, &(0x7f0000000040)=""/18, &(0x7f0000000100)=0x12) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x600, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 297.690467][T25813] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, 08:53:29 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x4000080000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:29 executing program 0: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x3002, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:30 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:30 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000081993285d02ef187943a1b17be24ff5861741e890ceb3491ce62"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x4000, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:30 executing program 0: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:30 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7506000000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x5801, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:30 executing program 0: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:30 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='pids.current\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x1000000, &(0x7f0000000000)={[{@user_xattr='user_xattr'}]}) r2 = syz_open_pts(r1, 0x400140) close(r2) 08:53:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x9003, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:30 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:30 executing program 0: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:31 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:31 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x20cc3, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x2, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:31 executing program 0: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) [ 299.247419][T25918] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, [ 299.346769][T25927] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, 08:53:31 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x3, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:31 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:31 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) accept4(r8, &(0x7f0000000dc0)=@nfc, &(0x7f0000000e40)=0x80, 0x800) ioctl$TIOCCONS(r7, 0x541d) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d80)=0xffffffffffffffff, 0x4) dup2(r10, r11) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) connect(r9, &(0x7f0000000100)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x36}, 0x3}}, 0x80) 08:53:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x4, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 299.586499][T25940] limit_mt_check: 11 callbacks suppressed [ 299.586505][T25940] xt_limit: Overflow, try lower: 620756992/18944 [ 299.645291][T25941] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value [ 299.708690][T25951] xt_limit: Overflow, try lower: 620756992/18944 [ 299.711066][T25952] xt_limit: Overflow, try lower: 620756992/18944 [ 299.736295][T25952] xt_limit: Overflow, try lower: 620756992/18944 [ 299.774903][T25952] xt_limit: Overflow, try lower: 620756992/18944 [ 299.786480][T25941] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value [ 299.800854][T25961] xt_limit: Overflow, try lower: 620756992/18944 08:53:31 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:31 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x6, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 299.924242][T25965] xt_limit: Overflow, try lower: 620756992/18944 08:53:31 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:31 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f00000001c0)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d307830303a303030303030303030303063302c006c5f4e7975f887cd725080346ba8367786ea30abb3e6a22a4c099c58ca702e13d6a24f891397eac80495fff326a1e5e832af97d06eb623d969a4e905bdbf63cde6d17e09ca4a39847ba8cc1114f57c922812a5e60ab54d9409c14ddee9fdd8d70f1f651423b009e31b40b6dadd9de34df2a56860b6dac028d398e9332deeeff6374bcb9fb0fa753a"]) 08:53:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x8, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:31 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) [ 300.116407][T25985] xt_limit: Overflow, try lower: 620756992/18944 [ 300.117186][T25983] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=0x00:00000000000c0" or missing value [ 300.248460][T25994] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=0x00:00000000000c0" or missing value 08:53:32 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x158, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:32 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:32 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2e2fff010000306fc286bc8709e8024bb6bf9709ab930a7650facc0d0e32c4cab62dc8122f6d34a378473afd44539c5ee29690aab6b098e1249353b9394cc5146502828a56f65463abfa7a3e27f2b04370dcaaee74891f"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x230, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 300.520079][T26006] xt_limit: Overflow, try lower: 620756992/18944 [ 300.644287][T26018] xt_limit: Overflow, try lower: 620756992/18944 08:53:32 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x5cba000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:32 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x300, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:32 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:32 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x32e61) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB="6175746f5f64615f616cff03633d3078303030303030303030303030303063302c00"]) 08:53:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x390, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:32 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) [ 301.068035][T26045] EXT4-fs (sda1): Unrecognized mount option "auto_da_alÿc=0x00000000000000c0" or missing value 08:53:33 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x600, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:33 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:33 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB="2e2f66e96c6510"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$evdev(0xffffffffffffffff, &(0x7f0000000040)=[{{}, 0x1e, 0x8, 0x7}], 0x18) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1f) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x3002, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:33 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:33 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x4000, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:33 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:33 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x5801, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:33 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) [ 302.010799][T26102] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, 08:53:34 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xbfa405297e770000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x9003, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:34 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:34 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="1c8cb0252a57abb1be8d7feb8dbced897e27b23beec9f690cb5833d978e39c521e152a10f1e86c588638402f35d8cf2adfa568492598ccb64b085216e0f8b119d3ca7f8264d865531a9c8238652d89c15e55787f659ecfd22b2e8b3156e68cbe8bdfa21d2dbeecd5f9ac2689c70fae693c2b3dad86d9a8afecb44e1300cf3f73197f832714c79180420c127ed02c1e2ab067b4e678285bf2745e0f6a3c90bb718b2e78c2ff22551b90b0e86f4cd1812b9aad8786a925700b"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000100)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}, {@errors_continue='errors=continue'}, {@barrier_val={'barrier', 0x3d, 0x1}}]}) 08:53:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:34 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x2, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:34 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:34 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="f86db0e27e855bdf577622800100000091d7e4a914aafff78eb1f9846efd39556e6769045d86"], &(0x7f0000000180)='./file1\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$tmpfs(&(0x7f0000000100)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x80000001, 0x1, &(0x7f00000002c0)=[{&(0x7f00000001c0)="839e4a1784a11c54025e3dc9fca73edd757f65e22405cbfb43dd788d61c0d83f723ded68387b905c908dd3f8f82b61c269c99182170a0a36bbe483de1f59c47c67d77d15e6c68600caf6962af762573c7b5d5393d3d5e8a3ac0e4d2f78268fed5b1c16aee80f1ab13a824cef10f7dafa8a20e61fb9ac4fb0f7f7b2e5ea4108c3e7083b3b7e278941e8e2bbb5f957a54ab8f43e562944a1bd2d88a35c32627e982d0e0729104b8381b9a8c4b54d852e5a5e428aee13101ad867a02078246f75d2a17038ad939a29912c17917b65cf22823cc075b95cc7e8b1200b71d3758c126249b9bdcc9baa2ef25ebf", 0xea, 0x7f}], 0x30000, &(0x7f0000000300)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6f, 0x2d, 0x38, 0x38, 0x37, 0x37, 0x65, 0x35]}}, {@mpol={'mpol', 0x3d, {'prefer', '', @void}}}, {@nr_inodes={'nr_inodes', 0x3d, [0x65, 0x34, 0x25, 0x6d, 0x6b, 0x31]}}], [{@smackfstransmute={'smackfstransmute'}}, {@subj_user={'subj_user', 0x3d, 'auto_da_alloc'}}]}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) keyctl$join(0x1, &(0x7f0000000380)={'syz', 0x0}) 08:53:34 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:34 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x3, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:35 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xc02b000000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x4, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:35 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:35 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x101, 0x1}, 0xc) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) signalfd4(r0, &(0x7f0000000100)={[0x8]}, 0x8, 0x1800) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) recvmmsg(r1, &(0x7f0000000e00)=[{{&(0x7f00000001c0)=@pppoe, 0x80, &(0x7f0000000140)=[{&(0x7f0000000240)=""/78, 0x4e}], 0x1, &(0x7f0000001380)=""/4096, 0x1000}, 0x80000000}, {{&(0x7f0000000600)=@hci, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000680)=""/64, 0x40}, {&(0x7f00000006c0)=""/40, 0x28}, {&(0x7f0000000700)=""/28, 0x1c}, {&(0x7f0000000740)=""/146, 0x92}, {&(0x7f0000000800)=""/77, 0x4d}, {&(0x7f0000000880)=""/44, 0x2c}, {&(0x7f00000008c0)=""/204, 0xcc}], 0x7, &(0x7f0000000a40)=""/11, 0xb}, 0xd53}, {{&(0x7f0000000a80)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b00)=""/177, 0xb1}], 0x1, &(0x7f0000000c00)=""/87, 0x57}, 0x7ff}, {{0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000c80)}, {&(0x7f0000000cc0)=""/102, 0x66}], 0x2, &(0x7f0000000d80)=""/70, 0x46}}], 0x4, 0x40000000, &(0x7f0000000f00)={0x77359400}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x6, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 303.423673][T26194] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, 08:53:35 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x8, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:35 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) 08:53:35 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000040)) [ 303.764031][T26220] EXT4-fs (sda1): re-mounted. Opts: 08:53:35 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x158, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:35 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@data_journal='data=journal'}]}) [ 303.876554][T26234] EXT4-fs (sda1): re-mounted. Opts: 08:53:36 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x230, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:36 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000040), &(0x7f0000000100)=0x4) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:36 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, 0x0) [ 304.368045][T26261] EXT4-fs (sda1): re-mounted. Opts: 08:53:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x300, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 304.389107][T26259] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, 08:53:36 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:36 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, 0x0) 08:53:36 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) open(&(0x7f0000000040)='./file0\x00', 0x280601, 0x5) 08:53:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x390, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 304.694833][T26286] limit_mt_check: 22 callbacks suppressed [ 304.694839][T26286] xt_limit: Overflow, try lower: 620756992/18944 [ 304.716434][T26284] EXT4-fs (sda1): re-mounted. Opts: [ 304.783544][T26287] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, 08:53:36 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x600, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:36 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, 0x0) [ 304.863460][T26296] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, [ 304.922454][T26304] xt_limit: Overflow, try lower: 620756992/18944 [ 304.945984][T26303] EXT4-fs (sda1): re-mounted. Opts: 08:53:37 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x3002, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:37 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_netfilter(r2, &(0x7f0000000600)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000001380)={0x2610, 0xb, 0x6, 0x404, 0x70bd29, 0x25dfdbfb, {0xa, 0x0, 0x5}, [@nested={0x1362, 0x86, 0x0, 0x1, [@generic="6fc8145a04520aea74784b8f49d5550c985f0afebdf6a6441e6c8b93732ba779acde3f59a9b5cf32a130c70280dc9319f6a7061c4455b99f072083d197c08e4ce5725c84228032e65c94c6f1cb47371d392bc9ba2e0ad0bb95769b386ccace5623eb3c187e4f1f612deff94509be00202477b314ae76c6f49b4f16dee92afc52dfc2973b985cd62d10ec012173a978b7b854903ac54f9bca9544e64715c2c971dcad419f8f0d6d88e3b653a4b6a29aa64aab5d593c513942f2301b27121a268aac72b17fc2caa955012993b22ba1532bd78acdf6aeb696607e2f39780b826eb311ad939a6f8f07bc3b383fba2d7c09463061d71cc03aea746836e18478d6181f43766a63a414f9c817d2b7fb382ab01586460dbacca513fe5cde48b832ae961b2d6c80e27a01a5deac28271fdf359a5d292ae28dd5eb64c4b15dbac81a616441a1d2516fcd102af1b5e37940ac70d93e88abb18e0fb599fe86c63831f8a1a702c61a8f3c80f51d2d7626080c25a97de76d49181b959b1eb316e6f26c88bee5e7de24b29f36eb53e829304b2093e0febdb1ccf6755583205f28521dcadf11cc534d3f7225ea359489c509faf99015d610b35d6961bc690b516a181b7b0f79647fb88d3dc91ffe918721a384e4bfae7353569ebcafb387a6281bd7a3bd4afaf689166ff144f3766674e9b9347e949431d73a31aaa2ee8bef063adb624e28cf4afa4c115c266da677e8f934982725718284116c6776ac5a4dadaf269eb0fb8fdf44fe5b9f8be20cbded4c048ecb5cbffa679637d36d2b72dcac2f1e308f3ffdb714832bf1b153d0146fa1bad4096dcb767d0de47f71487769199db6aac97e1e1749079d06b6e0199f0e77d15581074dad4062d0184d3226393c9901b97c38cd222ac6aca3c2d065cdbfe4dee972491bd8db8ee440f6f5ef8b5b08ad01e3e1212de3300d5019f5886a7cf4ee43e811162f067f16faa12fbaf12aff614266c35e6cf9fbf076e8b0dccb3840635d253a0f9a88f66ba1ec3fe5f22cd737816e0ebb005316edda550b8ab4b6141df81767c2b2aedda7a9b7948e41fbb8cf014a405d050e857cd039af5c14d3bd8d7f19f1c27595a6aa6a9978a6e96919155caa424bfc2ef6c2ec2a4156b04fd642d9c9514fbbb7cfcc514d42796d3c1c867d9a4dcb720b142ad243fc332f17e56ed95d0c4943e7755b47b1ec3d457da5823e4ddf85eabaf477472485424080ec55b2e2f32f349d8f1558d35bf318fbecc08a88309d68dbace2b3934ed805e564c12199b1d22a4b54a83a78ad34297f1d9fa603d3ad5c79ade0530e071fe1413e82edad53bb60b68fe29b5fce8f86f0422c203c8ab919f5200e527a964ce86751086d680f4146da43140b0b83cf90e11f33d0e6e41ff778ada90bd8d892ce1c5c2258144f0d79b1200c622fd92ceadd0931e7d828341600ee50cc93ed29170705b3c99160176db96befdd8ca3bbad7febd9088f9255422e22e4738a97092d0a0c9ef91b59b69f52cdb272a0b1e77ecc277a0023c448d8d126c11145c4a8ed56f65104112e7fa2ad3cbeccc0cfec3a6af347bd012d574390f9d282b55863253fb13eaa63be6209fc265ceef47ed3eff0a78a05ad72d37433f92ea03be019e065007b8be7472a05ff128050df062b8534049451609668e6ae77455a8d49c2a4cb39f2a814cf4a2b6a5d2d519c8670397ff8e84c6bcc6b04675495987c796d9efec298ad278938f97cc6395b85a0d08982690b84a535326b0c87e6d6dc71508f74bf09a51a01bdfa865ceea000c864edd7c95e053a367cf0aabf702658b743a8decb4c1af9ef583a9516e8f2fc4ede53176847198cf0cc1169aae1d78e696ef4eee349fe439f2cde389ac4d0b36f8a3504428e0c08d75909b540a8087d2a669e93e91f9167e676f6b579cf79a5d305a4a625f79b446f348d28290cf87c1ce4bff8f77261afc4a3ece93b636bfa5b41cc3e540de9ecafbb9000bf13862f4a2f23c633805457fc2d8a43ff4a7ce3b44d56fdeb7d15d8b2ba35192ae4c44c1236436aa3ddf25ea9da505c09bff747ca8f404a4d783f889ab9041fe2a551d7dec6f126d4aacb3f9b0009937cac69f46f92698bbe4d20dec5f213a65f79cdaa5ea5b6ed438aa43577607ec0b5c15f84119bd0ad14660c79c75e36a867b0fca720a9a52b59b60c59f596337f8c5bd0f4e83e34eb0aec89a4b2094e5ba4696288493646a520d5b029ce36a6547db5ed5a5df94f1321b42fe36296a48ce1a59ca9453ea691279ba25b15500b29c2a3d7e1aa1543a7c5d0f8ba9cfd76e506456366ceeb0caa59ee88fc5cddeef91706999b37c964aad10002f30406d10ecdafee0304894cd9dc4e2942a24e0e5eb331b33816c9fb4a4033a4189fd4ffb0051090408ca1a34c4eef8f4458556771d7f7a594384ca036b260df1fb5ed6b492f8b744faaefcef188f8dcfeeaa4b62b7bd099d0aaceb698b1d9573d130f3302c21de8490d50f7690749346808caf22627af58d4d5e3dabb8295eb3b9e5e0ef605104ea947b5660aa0bc7adbc3f3c994d5b84c831859299d14a622d8c4f9fd871524d74a62863df784b81313ddac851495ffef0359d2b9afb0a47ae55b3a422d3a54925fabed6e0f1dc6ce31a05d1d017a81a6640e33156fef2dd5d9d806faca9ae8fb8f2553f30ff4e0c9e712d6928dcdf841b245220275f1737b78c96d4698dbee94020a2cb847f4d044a120e33f6cd29e625e8d3a8d8e67e956009bac034e06bbafde9eb45ce46ad19b8a8f968a78807eb663463048c943ea34fe78e57d917ed073c178f84498a9130fa3c2a2d7a6ad9b86d091772e22ff71e48bba7aa4763e0200e3ffcd94e9180531546a9d53334d3e009c96634de2e61d22e6233de41c0becfb6b0b184d7d9874f39515eebb18b5fd57183887ffb482e0441595c813ab3a26902b490a80fd48dfe6bed9ce8d7a347f1847dccc12fc44a596d905f153e48e63aa4da910bffd3a55daf245dafaf7ee9ad8a3fa7b9b82752940968fd70584b27729c60eb45f6f26fb86ca6f0b8687266adde3ce593efefb7d857cf1613236f730818ae98bc7234aa19d4aaf6fc1c44ec948f2fc5940d9fb23b3a638c56f21126f48a89c33ccb52909456c50a6d5c6f1de9d59f3e25b22b5628c3787057b91bde4e4854f53daa1b8cce790db67de9498176bab8bdca21699ab0714aa94b1a5559b9e8b59dd500b7128b487dac8d957a7f23a16acfa18d51dbc1ed1296a4e5844dd7e8c3d3ab09cd276617a3b8bafbb13b08034b7ac4f00de7793a9828037eaa42a4d0108067988ac5fdf2eba4cf38e7cd4f73bfa00a331d79f1df9cd0cd04f971cc82697d4351945780e9ea4f8177a93e6377f3183cb41922590785154d000073d431f5860863c3ff0050389586bda3dfffa42203751731548d44bc46d929bacfeb53f6a0c51c3b60f9062287675c736e633db5da23b77c7c487f985f19dfc18e028f4e06b685da0ca55530455c7e9a2b9d456dbb1a3bce2fee31d724b716fafec6ec3ace6f250037f4a9e0e1a93498aff9729a752c8cc153345b0fd22ffb9822c1a75d7432497e6dd4d27f8e9018444b8f92bc5e76bb7f5c7284f33dd16df1357d0d9cb09df82a7b847ad68b3e2cfd6fa40c4bd8503f4870674da60b81c2d8b8772f92cfc44f813ee1b564b5a27e4852afade78372978fa91ea99a95ec232917cb7f6088feabb3708f4889721401d8d97b85e8ae4b71c36685f31dc881523668f5142987e0164b686baa6660c6c85fe5f557ca65815081c83059bcc9c04a601cd2a434ca1349a53fc06ad1951e7c71ac445910c7c0895684de896537c5a032ae034dcec1d9f75cca2b7ccd380e98c96f08322707beddd86e060e42b09da7960cc7fe20b3a21c9b869c95329f8d397da8cd03d1debe4edcd88fb3b0040518a790b8a80b56f75126eb27ef420bee64d82cb1f17cf171d20bb9a8485ed670a13f38c60955f929c95c13a3379f609a408beb1b1c3bb272c94e433f0cfb3e445a0b4bb8090179727bbc06e9750413f4db445f732fed5cf13dea31a02c5ebfdff7c7f24b654bcc9429aa0ae18c46182b66a24cc9364f12064077855da1df2e67984fb0c24f6993a80899297e39abc8b4428d4e6c409eee77edfdc492f3d269ef710b04b605e831fe0c168fbb2bfe7bf2b817af8092444efd20c3970f5d4baeaa07fe3e3ebdc6641954e0d76ec8d8f6bf6eeea61606560b75e329b5d1b0821a380f1c9da10dc83f6b82cce8ce4ea3d97e418785b0ea01a5dae37128cb48dc0bc947f958fcc3b496eae9bfd5eea24b275078871ace7e722f0e63dd7f5ac03e6bebbfe2dabbf00823874bdea10ee88dbb451adccc8e33b47034e7e94a458a6c5687853f52c745ea9ad772f132fd2feea462dcf9f4be528e2e0643def061e947240f9cfe1606d0a42fa67fabcf042faaeec81443478507c3b28803862c9fe4ba27862cac1f4a55e6ed0a30cc0c00343d1d4b6507f3cd1e17c9c2e089007724353d9b9d0b047dff00633df92cdf7a07b984d827d3bab2ad995ac98db5353955c1ea9f1bcfd32ef12b32eab0a152ef88df5fa082e169c4275c01d5eccb66da7c815a48e5d7d3ca4f8e4621c14b8550382148d297f501f57b73598fed4b0d327b086423de5e6a39e5b414ff70133193acedfa883af44db21d8b7510317e8e6f53ea00c793268a589d304c265b3df8ec27f83cf4a52efb1ce2f7c7016fb9e4bf51991b52eb2794caaef7568cd06e75df7819e980053dfc56991498e9b45b70f6bd23e3cd1a7da2acb9a9757f2d2f06dfb3f53598e7c9b01773c225f1a229440762f62b90075d1940daf0ed7bd42739642f4544780207b72b761869a65883fb090b62716746a0cffcce978a358ef762757b483a08dfec7e346b5c0191283acd0bc8b7897ca02a1f2ffe6a3d84738896b18f7dfd51316889197e0331835245fef4bea746f7e033b3a92dbaf41a7f1639908645459cc6343414593e06342f85ee7932a200c9edacab17ddad7165a67d063930e70b2c3b7deefc8e24a145b307129eef5b9802866922fb7871a4d9f118dd47384a997fb6394c90bea8b63f40011fb96e42304c1142cff8e5126349de487823532b076cea70d88edc54c239fdf939cebb83e321896e3ac01b2fff82998a3a2341d4846c44254c211ee8a7e94cac89c71e1fd0e57bb275a01fa74971d053283c851e4b466cd3db4d055b35c5652e6cb3c085ccd9a754defd0610ffdc979b712af7afd55e514b5f127aec9dde147f595bccaf47c706f5f35ed88b02713ce74eecb6b77f9dcff7af16e3a0e2410a90187b7ba6f419fd50a2ef005b1d624f6e563321cbf2abffe400c1c0e77de4937f9d6dd5b3d0d2a7daa23324cc7c0f510efff632b78a389da85f48b12876ff1adba65bfb2b8626fc1eace017b10f61e715f69b6e3efc2ae3e02d4a577a57919567e359c892838f478a038c2ef4da778ac56157dab714c83113484b6c3ea24084db8af33bc74ee5cb44aace32f144325d3f9ce6bca61c1e15c710584b904020f127f98e1d42ac1782de8de9516b0f03274598b1cf4b14860476df58a7d6a8a92bb50279d5a071366df19e8a446bd80633eafde4ddaa05c217a3bb6811aefab42818922e4edb6cffcc03e818bbe05bcb0d1b5f0d50f2383f90b70d67110e8ca4aa80feb1e2e24776ead9488a17c12cc668340447c0c02ef621b47c28f76a0175e64a675195a333494ccfd0cf695b2cfcdc05f518a61fccb0cf260f0d9f365d944a2e0ab8adbc342a52b", @generic, @generic="a87a19d25d9e88cc78f85281ae3494461a7e60aa542a536ec6ea7995af55b94c6b7df08699f1e3f59b37bae5cca2528f9fd794ea3f9eb710264ec2b25e8dd9458cd9b14bbea36e38a53aa3128f2e43707496fce7c3244a8928748c288d9f06a4149de6f21c8b6b25250cf6f3c8207aa4f1436fef6f3ff9725d8d46fb47b0b1076f1a3e855a4dd1d5ba746707adf06a5d5ff7da9b978b0db9f204263c6980131943e624bd402c337b115082506f163d9a86786e26d2d21e7b3e206671d0e6a706cf7d2bd73c03e28a45ab6264dd54", @typed={0x5, 0x1b, 0x0, 0x0, @str='\x00'}, @generic="157655f017af18484abd25babf729317c3561c1b7fdd6c3a6b274e79891b78a8b991ac1702d49f421f1d3ac0e952fb78aa01d08dccdf28a182264386600ab93cffe193c71354136c06f795a3273303846453cee2d6fe0d72465bed319363489f8fd6f715b74141eaac434ec5e5fdcaf3463f70fe7605def99008a58ea02462e1d300b2cbb3e7f9c82b48319f321820fa92", @generic="45c35f9ec545b8e215c8f2514858ec9be18c7c839111fdbe32d5ba5527c97242cf3c2d8a05204b36c2338f3059c54665f84def15640aabf56d83222cc37f05916aeeaca8fa2e186720066f0edf048a1b831a7ec2ab16f0ee3a7139c120a4c8324416486a5f9406aa9bd53ca7cd2b9c57ed35fb16a0668c32134ab7", @typed={0x8, 0x25, 0x0, 0x0, @fd=r0}, @typed={0x14, 0x7b, 0x0, 0x0, @ipv6=@mcast1}, @generic="afda3b79434cd6a8beb7d3b5b87fb9ee7ddd8fbc4243e944b6b92678681de375fbeefa47e9df6a12ed2a55f701c3e4b5de2fdfa10bffd23634e0976da7ea803b60d3d9fae66cb7321e7cb0b4a5450c189c0e87437ed64c11b7d922e63fe0427e55dd1e21ade341c0f886597f839eea196b755e3a5f9759ab115b35a568cae632988a53f1b3ca4643708b9877619306728815b007e2672e17af797a32a7252d40886bb081", @typed={0xb9, 0x13, 0x0, 0x0, @binary="9b90fd9014b89eedf739e1c4f8b37dcf73c915f5780c08a75da19f42e05400a5ff16031ad1bdd16641f614f935338169c32864a628003ddccf0c452d8e9d0fd779887722f8fd5bd83b5f215a029bd3f386fd4aba41f7de1b127f056724e24c8fe1b3bcc5bfefae3b8613903cd406ce353b56b62b21f24f0168562d90097e943965129e1390349c8fcdac9de90ec41a00d15d0d4bdc762620afbefc1015617c2c5262a7783d0689f2f208cfab2d4f47dda568eeafe4"}]}, @generic="c2d6456932328eb3dad76320b95c03e8f2b8fc42736baca5f346dda5be7e44f7a0dd484fcc95dc5f0e95085588626aa7d27671fe1b8f017270d3a64f9ddc14", @generic="0c3c52a94aa0acd22cc9631d0c2a919631e1545d2fd9fd57d00d01d416400b696a54559179091d06658f775997071e72e7ce5230a4d6dd1d9d0329a42a8ef9c8cfbb7554bc8c0ae9d23d906859511c1469e47723caf22c73405b659068e19f5d0f0918c97cec0dce0a4df03e29448715c225c9052f1e83b5e621e8cce3a2326a8c298cb242c158db347ca0e57b23b7f07d0cf94aec1800e5738e28bf4edb78452c0f5fe4c386b8bf7e11126131cd052b078ddcebc513af48a9c5be882ae63ec4ba342531f3ce46b449be904dfa06b4bdc440b01c11f9c6c702b917ba20e89d", @generic="e47e6b7fdc272774126668c53201b0214ab20194922c11b90a2ea777c06e85f8429a654e8328adc936ddbd56f87bbd2b5dff8d8b60a4598548e7bbf744fd0c901bb3f588850fb306b2699ffc73a3f4be46095cc04d8d91fd07d8ed9e7aa68898d63498d2ed8d961736d0c957cf82337f3deab75d18a134ce4f28286c07b8a567748bdc69e023ac22205e43e5b0122724ff91d585936b70aa90d09329ea862bc53f9ac20184c5abfa1b1e00650bf593f1d0b4b2809e28e87aa92e828bfa3079f42ff14847f03b4595e82a5a21cffe4376c9a0dba2a2cb3e83793644", @nested={0x20, 0x65, 0x0, 0x1, [@generic, @generic="92", @generic="7a1b7160462342cfae0a774e99cc8e401ad062544150ae8893749f"]}, @nested={0x107b, 0x56, 0x0, 0x1, [@typed={0x14, 0x93, 0x0, 0x0, @ipv6=@mcast1}, @generic="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", @typed={0x8, 0x63, 0x0, 0x0, @u32=0x8}, @generic="90ce9cd703f12132b651390a40aef3ec05119b7eec04c1ab53b029aa56d34c3b36299a64d7d523fa8b1b9c91bfc13ca9fa04141ce8dea645f2b0f4e55494256670a42c527a947a9d350f754a9af8672496b3806b3eaeca36b2d483"]}]}, 0x2610}, 0x1, 0x0, 0x0, 0x40}, 0x40010) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) dup(r0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r6, 0x10, &(0x7f0000000040)={&(0x7f00000001c0)=""/132, 0x84, 0xffffffffffffffff}}, 0x10) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:37 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)) 08:53:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x4000, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 305.338395][T26322] xt_limit: Overflow, try lower: 620756992/18944 [ 305.349584][T26324] xt_limit: Overflow, try lower: 620756992/18944 [ 305.356223][T26323] EXT4-fs (sda1): re-mounted. Opts: [ 305.373781][T26322] xt_limit: Overflow, try lower: 620756992/18944 [ 305.395330][T26322] xt_limit: Overflow, try lower: 620756992/18944 [ 305.466799][T26334] xt_limit: Overflow, try lower: 620756992/18944 08:53:37 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:37 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)) 08:53:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x5801, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x9003, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 305.650866][T26349] xt_limit: Overflow, try lower: 620756992/18944 [ 305.742015][T26356] xt_limit: Overflow, try lower: 620756992/18944 08:53:37 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2200000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:37 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b80f2, &(0x7f00000000c0)) 08:53:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x28f5c, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 305.924317][T26366] xt_limit: Overflow, try lower: 620756992/18944 08:53:38 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x40000, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:38 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) accept4(r8, &(0x7f0000000dc0)=@nfc, &(0x7f0000000e40)=0x80, 0x800) ioctl$TIOCCONS(r7, 0x541d) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d80)=0xffffffffffffffff, 0x4) dup2(r10, r11) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) connect(r9, &(0x7f0000000100)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x36}, 0x3}}, 0x80) 08:53:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0xcb85e, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x1000000, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:38 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:38 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) accept4(r8, &(0x7f0000000dc0)=@nfc, &(0x7f0000000e40)=0x80, 0x800) ioctl$TIOCCONS(r7, 0x541d) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d80)=0xffffffffffffffff, 0x4) dup2(r10, r11) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) connect(r9, &(0x7f0000000100)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x36}, 0x3}}, 0x80) 08:53:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x2000000, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x3000000, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:38 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2401000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x6000000, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:38 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) accept4(r8, &(0x7f0000000dc0)=@nfc, &(0x7f0000000e40)=0x80, 0x800) ioctl$TIOCCONS(r7, 0x541d) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d80)=0xffffffffffffffff, 0x4) dup2(r10, r11) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) connect(r9, &(0x7f0000000100)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x36}, 0x3}}, 0x80) 08:53:39 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x8000000, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:39 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) accept4(r8, &(0x7f0000000dc0)=@nfc, &(0x7f0000000e40)=0x80, 0x800) ioctl$TIOCCONS(r7, 0x541d) r9 = socket$inet_tcp(0x2, 0x1, 0x0) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) r11 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d80)=0xffffffffffffffff, 0x4) dup2(r10, r11) setsockopt$IPT_SO_SET_REPLACE(r9, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x30020000, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x40000000, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:39 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:39 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) accept4(r8, &(0x7f0000000dc0)=@nfc, &(0x7f0000000e40)=0x80, 0x800) ioctl$TIOCCONS(r7, 0x541d) socket$inet_tcp(0x2, 0x1, 0x0) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d80)=0xffffffffffffffff, 0x4) dup2(r9, r10) 08:53:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x58010000, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x5c8f0200, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:39 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:39 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) accept4(r8, &(0x7f0000000dc0)=@nfc, &(0x7f0000000e40)=0x80, 0x800) ioctl$TIOCCONS(r7, 0x541d) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000d80)=0xffffffffffffffff, 0x4) 08:53:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x5eb80c00, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:40 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffefffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x90030000, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:40 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) accept4(r8, &(0x7f0000000dc0)=@nfc, &(0x7f0000000e40)=0x80, 0x800) ioctl$TIOCCONS(r7, 0x541d) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 08:53:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x2, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:40 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xa445010000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x3, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:40 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) accept4(r8, &(0x7f0000000dc0)=@nfc, &(0x7f0000000e40)=0x80, 0x800) ioctl$TIOCCONS(r7, 0x541d) socket$inet_tcp(0x2, 0x1, 0x0) 08:53:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x4, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 308.563563][T26512] EXT4-fs: 10 callbacks suppressed [ 308.563572][T26512] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value 08:53:40 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x6, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:40 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r8, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) accept4(r8, &(0x7f0000000dc0)=@nfc, &(0x7f0000000e40)=0x80, 0x800) ioctl$TIOCCONS(r7, 0x541d) [ 308.807900][T26530] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value 08:53:41 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x8, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:41 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) accept4(r7, &(0x7f0000000dc0)=@nfc, &(0x7f0000000e40)=0x80, 0x800) 08:53:41 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x800000000000, 0x0, 0x0, 0x3802839, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000200)=0xc06d, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$pppl2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x2, 0x4) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000280)={0x4, 0x70, 0x1, 0x7, 0x1f, 0x8, 0x0, 0x2, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x5, 0x80000000}, 0x800, 0x4, 0x1ff, 0x5, 0xf41c, 0x3}) r3 = socket(0x10, 0x4000000000000002, 0xc) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) process_vm_writev(r4, &(0x7f00000008c0)=[{&(0x7f00000003c0)=""/125, 0x7d}, {&(0x7f0000000440)=""/27, 0x1b}, {&(0x7f0000000480)=""/207, 0xcf}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000000580)=""/73, 0x49}, {&(0x7f0000000600)=""/12, 0xc}, {&(0x7f0000000640)=""/69, 0x45}, {&(0x7f00000006c0)=""/247, 0xf7}, {&(0x7f00000007c0)=""/77, 0x4d}, {&(0x7f0000000840)=""/69, 0x45}], 0xa, &(0x7f0000000c00)=[{&(0x7f0000000980)=""/241, 0xf1}, {&(0x7f0000000a80)=""/25, 0x19}, {&(0x7f0000002380)=""/4096, 0x1000}, {&(0x7f0000000ac0)=""/66, 0x42}, {&(0x7f0000000b40)=""/53, 0x35}, {&(0x7f0000000b80)=""/113, 0x71}], 0x6, 0x0) write(r3, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f30503000a000100010423dcffdf00", 0x23c) r5 = syz_genetlink_get_family_id$netlbl_mgmt(0x0) sendmsg$NLBL_MGMT_C_REMOVE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000126bd7000fbdbdf250200000005000100000000000600010058000000075e6e2a2757368e762cec769cfa4860ca716fb83824077b93d6a06bf85fd86d4d570696b9b7253127eef12cc1504ad24748e3daf53d4465212da22c8717900b98a839b5d3a4bb9427119fbdc767673d62cc98ae3571e6ed1d169b317e48bd191ae3f521fe1c69051aefffaeab37bcef050ead5e18b2edfa5faa24be16"], 0x24}}, 0x20000004) sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r5, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xb}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @dev={0xac, 0x14, 0x14, 0x17}}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) 08:53:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x158, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 309.254247][T26544] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value 08:53:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x230, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:41 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r6) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:41 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xe0ffffffffffffff, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:41 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x38038bc, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) [ 309.507846][T26576] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value 08:53:41 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4000080000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x300, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:41 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r6) socket$inet_tcp(0x2, 0x1, 0x0) [ 309.741214][T26601] limit_mt_check: 37 callbacks suppressed [ 309.741220][T26601] xt_limit: Overflow, try lower: 620756992/18944 [ 309.774887][T26598] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value 08:53:42 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffff0f, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x390, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:42 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r6) 08:53:42 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r2, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000001140)='batadv\x00') sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x24, r3, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_VLANID={0x6}]}, 0x24}}, 0x20000000) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x44, r3, 0x800, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0xaa}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x2}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x50}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) [ 310.131736][T26621] xt_limit: Overflow, try lower: 620756992/18944 [ 310.149262][T26619] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value [ 310.149764][T26620] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 08:53:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x600, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 310.193569][T26620] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 08:53:42 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) socket$inet_icmp_raw(0x2, 0x3, 0x1) 08:53:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x3002, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 310.248255][T26632] xt_limit: Overflow, try lower: 620756992/18944 [ 310.259096][T26624] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, [ 310.338509][T26620] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 310.364554][T26651] xt_limit: Overflow, try lower: 620756992/18944 [ 310.376026][T26652] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, 08:53:42 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x4000, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 310.376633][T26620] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 310.435931][T26650] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value [ 310.505778][T26672] xt_limit: Overflow, try lower: 620756992/18944 08:53:42 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x5801, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:42 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) [ 310.685200][T26685] xt_limit: Overflow, try lower: 620756992/18944 [ 310.704208][T26683] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value 08:53:42 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc'}}]}) 08:53:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x9003, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:42 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000d40)=[@mss={0x2, 0x8}, @window={0x3, 0x8, 0x6a0}, @sack_perm, @sack_perm, @timestamp, @sack_perm, @sack_perm, @sack_perm], 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x28f5c, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 311.072811][T26698] xt_limit: Overflow, try lower: 620756992/18944 08:53:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x40000, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:43 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) ioctl$KDDELIO(r0, 0x4b35, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) [ 311.144706][T26704] xt_limit: Overflow, try lower: 620756992/18944 08:53:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0xcb85e, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 311.221724][T26710] xt_limit: Overflow, try lower: 620756992/18944 [ 311.320655][T26718] xt_limit: Overflow, try lower: 620756992/18944 08:53:43 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:43 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSBRK(r5, 0x5427) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:43 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x1000000, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:43 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:43 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0xa}}]}) 08:53:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x2000000, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:43 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r4) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:43 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f00002d5000/0x1000)=nil, 0x1000, 0x0, r0) pkey_free(r0) pkey_free(r0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e21, @multicast2}, 0x10) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r4, r2, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r1, r4) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$IPSET_CMD_TEST(r9, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0xb, 0x6, 0x801, 0x0, 0x0, {0x3, 0x0, 0x3}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10008011}, 0x4000) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r10, r6, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r5, r10) r11 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r12 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000480)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r11, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, r12, 0x200, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}}, 0x20040000) r13 = openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETAF(r13, 0x5408, &(0x7f00000005c0)={0x9, 0x1, 0x8000, 0x3, 0x3, "efe306d7b8495ab9"}) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x81800, &(0x7f00000001c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0/file0'}}, {@metacopy_on='metacopy=on'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_auto='xino=auto'}], [{@pcr={'pcr', 0x3d, 0x3c}}, {@obj_role={'obj_role', 0x3d, 'auto_da_alloc'}}, {@pcr={'pcr', 0x3d, 0xe}}, {@euid_lt={'euid<', r1}}, {@subj_user={'subj_user', 0x3d, 'auto_da_alloc'}}, {@fowner_gt={'fowner>', r5}}, {@hash='hash'}]}) 08:53:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x3000000, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:44 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r4) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x6000000, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:44 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x8000000, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:44 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:44 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x22}}]}) 08:53:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x30020000, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:44 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYPTR], &(0x7f0000000100)='./file0\x00', 0x0, 0x30c5004, 0x0) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000180)=ANY=[@ANYBLOB="6175746ff9a2c39f43b2fbf23c03fc5f64615f61f76c6f635d307830303030303030b8d0ef5c2f567bb9d68fdd3f1c720024a4d665e573960b4cc0934f508790736a463f9f901d48312b09dd9125309e51a99b17276e2575bd37aee20394716fc2727e4a59a48386de5fcde65c64b5162f9f87bf8531de2d9db4263760"]) 08:53:44 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r4) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x40000000, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:44 executing program 2: syz_extract_tcp_res(&(0x7f0000000140), 0x600, 0x1) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f00000001c0)=@v2={0x5, 0x1, 0x6, 0x1, 0xe6, "fa494bde6f401f6eeb46def1cfe2edfb6009052c26fc5aa6dab4a389c563bd4e830a1b609ff1f7115169369144a8406fabfee91b997c61de065ed94910762864dfcbe3f53bae37d1b216b87323f022079c0ebac7a29b7b24c0021c14f629735d3a229a67f044219a07355a1402dcd06a7311d8f3a5bbbae3a15eb60852de74d0134aa3f2e29ab6a8abf4624b19142d97c9cd52f80cb996a04ccacf1248fadd8f0e75fe6427b07cee1b56f352e39c51d72be785c077ca1bd40826f94a1a4001fcf30cffdf0f7494c5c4977ed9bc83e968faf256efa6feef79c91772db9ba50c1c4da323382ec4"}, 0xef, 0x7) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f00000002c0)) 08:53:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x58010000, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:44 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x5c8f0200, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:45 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x5eb80c00, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:45 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x25}}]}) 08:53:45 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:45 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x90030000, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:45 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x2}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x3}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:45 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:45 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x2c}}]}) 08:53:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x4}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 313.604164][T26892] EXT4-fs: 20 callbacks suppressed [ 313.604173][T26892] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, [ 313.618367][T26894] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value [ 313.688808][T26904] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value [ 313.800673][T26913] EXT4-fs (sda1): Unrecognized mount option "0x0000000000000000" or missing value 08:53:45 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xffefffff00000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:45 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2}}]}) 08:53:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x6}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:45 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) mount(&(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f0000001200)=ANY=[@ANYRES16=r1, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYPTR64, @ANYBLOB="b7b2bd2457c8af898117cfbe0d2285bfa05ba1d1bc1431ab435b1d65c52c2ee041f558d78a8ba82dbd8d219975c806fb7072fb2e8774325f41fb9862f42f3370e818476c07937654b6cfcdf20c947154bbaddae0c2064cc4f99125bd526998bb00347733001e48cf4532decf8bbdf5325a57785f9434013a5026f4c93b2eac8ca08a734abb5e5d6bc01dcb8de1c3bd643a88a967c1f1305810d373b629bdbab8a1a066fc77106c1732d7e9d4c5921df6595918dad91983e403506cb3704e0e47d7a34bfdda0c85d9d1be1b71ac3b88aff73629356d2734e171ec9bdd04da917914d77fe822b31c459fe95916f02dc1d20df3ab03781cd3df0d5d0b223a04a3729449f30023ba499e0b3afba7469f54f9adecf292d2a558b73b8e9b4c0dcb6a841e9078933f4c5e2a171c29953e6a31de97a661e4ab1efdf1381c5546a6155be70a0e1c9f7d8694b4ec4d0d78e657b3c81ccf2494ced81a57e418cb23aa2f038022bdb1db6ddb5d61a3b3d3a22e322560297c43ad410a4bdd49147976fe5a18cc133fc86623c62a5a17dededab94573850fd4509ecc5ea7aa280404f93ceaacb5f77eea3e508d7fe4a103326e67a1ad6c56b9ebf34947e8601d83d125e02ff45f3aa024dc76918736691e3525cf7ad99a63f7ebfda4155a2348beb6b3755cdee988d8fb6181d1a5d7ac6c244653fc46f5bde350c209d44ad9e27ab074da52fc14d9af439f913fdc5bf77ac6dae24b11b535b0f87312197d5ff755f4d238b461b77d5db11db727388cdd65b995c02824b51f04f0fd47764e4ccb46650e39250513209b18b10566fe08a10c92c9d67f12014c510947affdac3c9057ffa2a6b33d6a7bd9f47c5d7d629b6eb3d6d9452feea3dbc38f6eef9f86a1bdc01999ce5c1367568153ce39e938086b6baeef3e0556893e0f6d50db56266b55b040d30aecb55b9d5740583243b25d79f5f7108eae3f6763d25eac449c527975c7c084d7ff5cada0cdedeb1292162e92fc535ce2d6614eb6b300b91077cbd75c5ee870547c077a24d642a75b01811b41134c987733c119713240bd53b129b5aa20234d040eb5e89623dfc8d375eb7cb1cc4f7607f849566df18a1cb91524e0ac642e3628f093e95880add38097f24f1e12c6a10ec16358eda6921f45eb08aa797943bd6f51a1388d9eed12b164bcee36245d563bfaf81207cb9f90cdd8450b65ad2ecdce7af2a64b3f522d02f89bb8778cff4641faaceb576d6bc721b6359d290900e4a5b0b30d335456cebb4ec99ebee7555703ff3aaa0db766feec36da7025c0b155059aec60975bafebd7700b13b96329272bbdb5d22bc2eb0f314c9a97754519a13f912e622515adcc88a2fdf52d4969eeb6fd608629e47b2ef65e7060420c7252b7fba2758d7f1a24803bd1e3b63b38a1b5c701164f75750e0503aba920450d898223e9b9985b70904ad396cbb9dc8e8aefb17a0ca18117290fbbd6090083f22fa5fb5883f792ce00ae404b8effe189fdb1028bf7e0447e52e9dabb3a0dd4c63cfeedabec31e80713f0eac3b5179dc097bab5475e1cde61f7e7fb3d9f68e79837a8380fd1c24a6b31d0a9343d862c871018df30275644b364468057920d6c5f38faa2b12a48088b23ee5a421303e39fc00cc966d31124519e45099b95e523f58f7d09135a4625686c65eb3f7c7cb88988d4179c38b2a1a35ee983ad9b6bb905d0da692830ab203e498d93e8094b4c1e5fd02e350a26b5849d6b0f44bbb546e3384bc964b6077cb3b4172e66dbcbf0fbb1570d84e185fbd0f67aa6a62794f60f438e6b239f6d8fcda752b860259e17569b37c28b4d8bf708b52d9d4c0c937a61668a4b5f1bd98e6d2abc26ea680554dfd40607490e37f74cdf787918a8ece752dd79b87cafcd22ebda536af6fd4e5a6c3d70c0071c1e71a55bc51a9f6dd53aebc5a56f9ddd82fba6346dd278ef6bb85d9f30f18e7dc24d672446f58ae0a2b463af01acc889a8041833fc38cf76a5d40d6df95efa9fd0db27d00ef704bb8c46a00e12ae02f471ff36020201f7d1b94279318a751c1a26e6b63644abf7a529ab855702c6bde77804cea556843c24286aff47ca87547f9e17e760ffc23011134b30c30f843b685e7d833fec35ad02a20b9de7388574716e6e7ba0ebf29e8c9b7c45004b436e1c3c34e7a76685b9608abd1d3b00433e4e61599ffef4ed4fd66ab8b8962d6624b16239c490582a937956fd691763ead1890055bd63882c862d7477a697d0a87dd78e511ccc1a495dcee4258908a57bcfcb254231f1ddff1416425ce3ef615a799f788e02f02e5ce5594a64c4da771f7b3f5f9925b6f043dc79725de8039a88758610914e1565918389c22bb114b28ca3a9cd2756010eb873dd4a6b110c5ba54a2c88d8ef17bad1ac1b594cde5bc4590d1ed2d3f71efe40a160b8527a226a9946df64921787e079e97dd2b0bc9e3633ee142b2c691525ae174a9087a2fae97cb19d87293ad6ba41d533f4b20c3d8d76584d8cb01bc94887ca9225989a1af04cdfbb97d6dae18b2b6e1b4425051a17e77c21bde093d02b14212519908df8a42874e96ea0a22c91dcf69a22891789c462704a66e6d72f9f9ce648bf3936b4e1c8a1d906b30ad492ef08511e7028fea4548a03d35e479673c171f1c5f4681773c81a3d5bf2ea84a93e25b22d98f81bb2eda7059781432f8e7a6879d3abca4f26d63b55cdcdc4e1dcdaabe1cd5232ee0be497ac7e5c70c68f7d3a707014092bcd2e3c71ccb902aa6c04b5c237b7a981cc62c1689d2d33b5315a3f8256441283ca61378f1a790864f076300c1815f1aa13f917082ccbb65d7c6a598c313560bd4affbc9718435f664ef524bd1f9ef59c58e41b8178aef949cdbffd627a95c11eec8f6aca4dc3b21eca3f5884d59fca248f0c6606a14e0d1e8d83d098c7c97c08e1d5cff4258c85ea556739498f19d7587ff8a712015600a1eec2ee09e5534d260e00cbcec7ea25c3654d9e89545d206e39563a0f478154f5c7317ba3ce647074411271c737ba06ae1c2c21fcafe32f695bb1167c96faf1de71f8148f6be62e2581d69f093e5b119b5a21f4be763cc32e3af85f3bab8a314d0e6308205974e9029788bc25fd9a298b10ec4c1e96f91caea79cfa61b4fdaadfaa801bf81f1ba70adb46023af7a01e621117b38ae61b1e89a346a097293f30f8a8ccefa26a00198c33897f279a7ae11bef00f31cb8e34a124aeea889be6f456e1fc2d26f2830aa5141a310a45a68c5b31b7adb56ae58f08578f9ae3d9d44e1b15e6ca011d650c134bed6ebcb98b8d5ed987700a2488367b33bcfe9fb218fa1ab996db1cad13214c1d531962f3b3c2cbbe3c4f6e2bcf291da9d664d577ee3b36e4a2fe0c421ef7810bb1911d1e62163df21364dc0c8d47e885cbe332ea7cb8b31c23d523b8c3ddbd392cf9b851c392683bb67933719826ff388f22106f0158bb138406ab3f8acf0a5f6dbd166efb55fc33c16b4269082728d57218b8f8445309c4c81de1113ff119076c1d955549e81531ecf334890173759f7834b9abb3bcfacdc79908636b16a455fde9c6e64ee210dd354aebdf59def2470ca35fd840a40709929716430c10e1841875f7442c019b172d5840a27d1b277b3030caed18d1df70e5afc319ac1dcbbe6b089c8b6a5a9d2278f78b827c7fbd52ed6df18974f165258f10332d8a940b2b2f767023e80f6f0a1bd2ad168c7ce6da5f1b30fdd3485f97ae02670787d107d6a07309b1b31027eada3b4b563eb14081d211fb320f340f062f1ce148945dc5f5d2bb359bb2cb6e199fb87e15564955acc39e29ddb1ddb1546a971798b66a97df353c1e9f015d9f0ffd6cabf11181b2afb30ea19e743ab27f4b8ba838a01f6b4a0c8e8c34a8af34cc96e7e8df442686d428d3e7050467df34c335f9e2ebf3db830968c8af5cdd729ced03807c3f9dfa43dbf1a47f9953b3070db740831dfa086ad2def3398ad95505de548085e4c70b5b43be81472eca0c4328ecda425cedc8ebdb63e034ef0ef2e0ec1e5e34cb94a7f018747b308e79d519f1731e3b940542e5eadfd7992786b05534b0ebb1522bc8ba05b81257184ee16b2732d530113181010b6950d77a3e8a1745537d5c9680289771844cddffce260ea4eb48a052420d3de09edb86cf6e1d86763941797f0f9182f4726d4e95dd84f4f4bc6591369256b8b62691dd907d8bed93c8c2e6b1d4146e341aa40cca4842320df9bebae8929d7430d02d13b4b23cc5d4178835708895372d4f78f8fd6bcb58a1baa0acacf16fa3dde125ba977ca395bdf6b79219eb2c5ab519c7ca0817f0f6a388430b4b49fd67f0e2509fd595878462502058aa46df7a839bc7478c849e2d23cf65b076fdce7778e903db3f440be9366d75ebb5c28d3110950f93e1e9dcca89f481b95b7ffa95e9df6aba12af471a54ed52780a965c5f893ab8284d3e9042fc4b03e7c243afd1200cfc4e68b3661ec377d5524b48bcc131d64679b949bf6fc7087d296a523e93900e0fb7389cf0aef6307db5200fa4ea9bd218507824939ca6b956cc0d8a3ab0f964a6554e04d790d791c2f21e2d7ca5c3e7247525f01529f00ad04ab7b9aab4e14dcc671ce2332c7d494fed7c39147f863c022c57b3c86be2c5601c83468e67e252db2bc45b755b112fcff6e602ae2341f7bee78858c10e2cd58f6e0ca1ba6186c3a8d9279727ee634f79649d0de9a066a280d4da8804d3000a88c0681580dc090fc07fe6b15125050c9eb9e6fdd1f74b6fee08330e78cf2f304061ef815586a9e9346c716486b9de0a60b15745b3c6978e5ef40dc5a644d1a560706203012f2e7c7442f192347ea78cc0e8bedd9ef38fb1441b0864f68f0b9dba323014248825120b3588ac3a9b8e154d38ce024257080b4e9e211da6e222146c01ca62e58fca737b3fd72889c85d826ab8e7d63430691bcbbe943f600ed3acc1d4339f2e881f24ce9eb3b0175a8d7d5766cad0412c392e2bbc2542f0d807c5e9a23f8967050e61c2c19a653a4e95243edf2c24c982ea5f91710959406a0776b106994cbb6459d3d55f65144664d6efbc4132110ffe7c3ac0732169d925d8120a61f72a722a7083c63597075de8fa98400958fd4cbe1b7208cddbb21a02dfa5b94bab46a1afd8711a8574d69426c5d6c25a4d1bdc1aa071b33c74625b2a422115ac0b44adb4b8f82e2489955a1894f1fe0ab7318d84baf5c3f0d79fbf683e0d4d47d68d4517dc938c735f145e3cec71896004cd55451d24b5fd1f5576b4800fce98a8b8a83c2662b5513d68280bcf749c76a816b27eca829bb86e777b8613517a3cfc97a7644d655a3471fa5e2376b8ff1d1ce050605e659e77e8632fde62fa96b1c90973e13a48e5545925f1f718757b19b1e47402e716b23af62e01e0f7fbe04c6956d5c2f780a4ef75d0ea280bca68cf3415f28f4b7e590b5f7a3e466fa72a640aecd5f13c3891ed655496567f180f869b1b9a086682b01de95f6330ae5ab4c35fe7653f00f6adcd19510d2b22afacaf5e4979f3a78758a2ee45e4c10c4544cf0c077d62de495aead39c50ce79cb85a2a9e4e5146739ccf8ac9e785a232db25620380d86848b65aab228c4c474dcb72445b8748077caabbf81d7d38d6d3cd368f16a53ff2e51912751961f54cef0c115ee6c7f3fba7566c326e3bd09a12fe4fe89a935e0fb3ec59d4aa2f61302e43a290a8b9b271591706299788959c130eb3f2141688572599b1724230eade3b03364b41b507bec78e706620008241b8487457ca7643e7652569", @ANYRES32=r0, @ANYPTR64], @ANYRESOCT=0x0, @ANYRESOCT=r0, @ANYBLOB="4ddae9c6e529e01a40a1d0ccb66d4cbb3b71df5445c090f1f67f4c730663c9e1c68ca4f000220a86a29544a83239e0864ed39d0e8196a4f9ea267a71669cb14a1d3b645ec19add3d78ce6bdb724babba0b89676d01bf5e9adaecc7c54bcc228d0842d8cdd1c1f65a82d6f54000a7762e263371b436ce629088d49316ccc3ba47a2e18627ae7584cf19250109625fe99542f971074dd74f470d18e1599bcc05175d49ccc5a9c212827e8a9f05870fc51fb9f3aac30072df0d6bf3f9d3d0a1b2420502c10a64fa367caa214df76f7a575cb5a90f00c868685ba3856ba7", @ANYRES64]], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) inotify_init1(0x800) [ 314.000176][T26923] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000002, 08:53:45 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:45 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x8}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x158}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 314.117951][T26934] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value 08:53:46 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:46 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2e2f66696c65301ca247e9a0bd7a8a80b2f5c3f162ec1020ab510ef05f9c0dd9f917fba01e4b428e7b1437d095676c3facb8cceb2ec674281f56feb4547b65a78e6feb83d335804bc4ded226d450387727c23840507bf2c544a68851495f445299337cddc51d03381dd880081d6ef1aa2ea5bde98f95220884637f56b107000000163a60d32223f8c31c0eb033140e00ac8a8771475e8583b58b3733b25cd973686f2b8abf71416cd76bbe4d0000000000000000"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x230}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 314.168400][T26943] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000002, 08:53:46 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3}}]}) [ 314.343743][T26966] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value [ 314.415564][T26969] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000003, [ 314.537275][T26983] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000003, 08:53:46 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x300}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:46 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}]}) 08:53:46 executing program 0: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r3 = eventfd2(0x5, 0x80800) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x68, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x4c, 0x18, {0xe291, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8050}, 0x8000) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) [ 314.789776][T26996] limit_mt_check: 19 callbacks suppressed [ 314.789782][T26996] xt_limit: Overflow, try lower: 620756992/18944 08:53:46 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:46 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2ea5b8bdc2c2eae3cd80378dd7c437782f66696c6530"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r5, r3, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r2, r5) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = clone3(&(0x7f0000000380)={0x1100, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x1}, 0x0, 0x0, &(0x7f0000000280)=""/179, &(0x7f0000000340)=[0xffffffffffffffff, r6, 0x0, 0x0, 0x0, r7, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x50) r9 = getuid() stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r12 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r13, r11, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r10, r13) r14 = getpid() sched_setattr(r14, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r15 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000200)=ANY=[@ANYBLOB="bf16000000000000b7070000010000004870000000000000bc700000000000009500faff000000008aa1210b29017b83c8e96e6405f7e93dba4d64b5030b3388b0409a814343f1ae341b74efa745a12f5c0685e5261482e31e0cacc902c97e6145201b062261ef487a4d26342c94f56a39359ba56724e4535d80ffbd6848d53382c262869ba15d8f0c2211a2b975eb2b9d08501c56ab5aa0d110c5d197e50ff28b4a3b05489d1d1245cb774879b0871dd71703eefe87d7919c5ea2a361b18cca1a363b2b28add653"], &(0x7f0000000140)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r17, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x37d) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r18}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={r14, r16, 0x0, 0xd, &(0x7f0000000400)='auto_da_alloc', r18}, 0x30) r20 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r23 = dup(r22) getsockname$packet(r23, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r24}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r24, r21}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) getgroups(0x2, &(0x7f0000000480)=[0xffffffffffffffff, 0x0]) sendmsg$netlink(r1, &(0x7f0000000500)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)=[{&(0x7f0000000540)=ANY=[@ANYBLOB="180000004200000129bd7000fcdbdf2508002c00", @ANYRES32=r2, @ANYBLOB="2612986e9bfe4f5d63c41dced53ecdede5f230b3883c8358a12ec7cd68f3467dd4c9b8eba167e7cc2efc2d1cf014d2317410f224a9e711a6d6912c91ef"], 0x18}], 0x1, &(0x7f00000004c0)=[@cred={{0x1c, 0x1, 0x2, {r8, r9, r13}}}, @cred={{0x1c, 0x1, 0x2, {r19, r21, r25}}}], 0x40, 0x8048840}, 0x804) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB="6175743030303030281178c630303063302c00"]) 08:53:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x390}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x600}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 314.904371][T27008] xt_limit: Overflow, try lower: 620756992/18944 08:53:46 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r2 = eventfd2(0x5, 0x80800) writev(r2, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r1, 0x1}, 0x1c}}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:47 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB="d745d355466530"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0]) [ 315.039166][T27016] xt_limit: Overflow, try lower: 620756992/18944 08:53:47 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x5}}]}) 08:53:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x3002}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 315.161984][T27039] xt_limit: Overflow, try lower: 620756992/18944 08:53:47 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffe0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x4000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:47 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r0 = eventfd2(0x5, 0x80800) writev(r0, &(0x7f0000000c80)=[{&(0x7f0000000600)="917117ca88578997a0b61bb006cdf578769a2b045672ca92c1a731014e4e3246a78c8ddb8a3a195c9c37315de101a094448922b376b7de3c424e59fecd7d2ed78aebb28a3c323d45ab0b06c92757a3543600518fb9f31241929de377d13ed9c81c404668536934fdedff6e68a5308ceb9bd54f960f5de581e22f2f617c5a54e2670eafed5f7f6af608546ad9d033506d6d385aa0077f3889", 0x98}, {&(0x7f00000006c0)="41e942676b7478dcd56f5301e85024d5e81b864d4de49cbd12fc192d52b1ea0d662c9482843e06073f4d117b5c0d3a3dd756617d2d2dae83445bb1855c54806d2fe4c0fb3803945ab78ebebac5be92eda377240544a011ada386c8f92c5b8280b2b9df12d98b81044f07ad9931b7d70867caae7c4e9ce636d87ffb306f8e66c06d10205fb29f94a2634f5d655491e4ea6d0266d903239e883d9825dff42007d7b92b203c9baa41c36dddcf25e163ecd98a13c35550683f9e958ae1c2b39595ce39729c219aa3452e8456eb4fd2e2acb96c9baebf455f73375a84da96e27e25f78b3a", 0xe2}, {&(0x7f00000007c0)="b88aab57a0", 0x5}, {&(0x7f0000000800)="eda8fbdae394972e78c4df4387cb26e02e7a49ab4320b94a5f8f1e4fbffdfe8a89a65b4b60c3b29869a3b3912f4b1052a881067a63a93ded4ea5188f6bd66178620a083356702c67f4460bf01341dd893496c5596e15ae6326d3d9da20f3466f4c1daa23f371b0fdbc3149e84f52644e92151e70aafab6d97cf4d434a8378244bed743c0ea0f2742428809ff3d2f33ef25cf4887974d1dc220c85f6bda4dfc2a4fabc2e1574666950d4bb43cc535655f168e19dbaad9650e8fe8a1f9c91475e0a4eed6330a908974e3a21d5d15197a7ba2", 0xd1}, {&(0x7f0000000900)="c7595ce7c2800a26ed14786269b145d40767149835ce4985f6217e117a13ad08bacef466d1ec4ec2959d373219af83d98cdbbbf38fdb3d220f7f045d1f46a7c857116b21192b4e1b76c511d1ec35447103e675f04bb01fd742d13e90286c1e2c8a3a8bcfd9af0c06fa6449fe5117e9abaaf094d8c39e3b28ec505743a8916c858dab529376a3336a707d38e5de9f6f968dbe821b9b80", 0x96}, {&(0x7f00000009c0)="597cf9102f5f94655adc25769907b83c513bb47368fe39f7f7479a753a07d04ed58a332fcb3e70546c94654849c85710b98c412a63a79ee8147b4b70a30cbb1d60aa51abbcdba7a1527e6a2a670242fb80fb23f204319000b0", 0x59}, {&(0x7f0000000a40)="3d8b27c1c341d06324a18f131d6a14f6e8f1240aae4a3153ab639a4543a7f8cd", 0x20}, {&(0x7f0000000a80)="221e8407c82a1e55f4661ab32cd83299e35c750ff56480b06f94d218055a2ae7e874925739f169affac877653452481bf13461684af9d0bb8cad62d461b8c0d9fd3878a767ba6eb60d24811935793576c391a4203de1d8badb497feb42110a90e19147c72349a224d259f64d636ef6dcf0072145eca46c501925d9cb5755e7bb36975e6660284bb3b6", 0x89}, {&(0x7f0000000b40)="abb9cf33de57e405a06b7abf5818f346c82a2a36044da3e43579e362e335e4963f8ec972a7af4eec3e37fe94e080d489ab5439dc98ee42c0d7f0bd15b49777a11e497d2dae63cff66e56dfce1851503b9b745052955fce8d391075dc8ab6899bfbf572345f4307ffa8a6e48b9e3a5fac9dffe82f543e9e6f009b32fae86206c8c02c6434d71e48d3b38a0b759b5afc27fee014f8ce48bc8c9e0e402b8ad5a36201a653f4fb5d54364610247440833d5a0851af5e346bb004641a8f9814e99424546bdeaeed769ae158ad8e751e22bcb7e77ffe2c9741a31e34eaea9388d0b051d891", 0xe2}, {&(0x7f0000000c40)="18c46077a7232fff8d4c8528a090055bf564418b946dc4628447f3f6a5705d8147684a9ba4994e992c375493cb", 0x2d}], 0xa) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:47 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r4, 0xab9535e9a6578fc1, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0x8}]}, 0x20}}, 0x0) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2400004d02c2abde0b", @ANYRES16=r4, @ANYBLOB="000429bd7000fbdbdf25310000000800db00", @ANYRES32=r5, @ANYBLOB="0800db00", @ANYRES32=r0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x20008040) syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x3, 0x0, 0x0, 0x28048bc, &(0x7f0000000100)) [ 315.482397][T27059] xt_limit: Overflow, try lower: 620756992/18944 [ 315.491222][T27060] netlink: 'syz-executor.2': attribute type 153 has an invalid length. [ 315.574825][T27060] netlink: 'syz-executor.2': attribute type 153 has an invalid length. 08:53:47 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:47 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x6}}]}) 08:53:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x5801}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:47 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') eventfd2(0x5, 0x80800) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:47 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) linkat(r2, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x9003}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 315.832250][T27088] xt_limit: Overflow, try lower: 620756992/18944 08:53:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x28f5c}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 315.945074][T27106] xt_limit: Overflow, try lower: 620756992/18944 08:53:47 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7}}]}) [ 316.129468][T27114] xt_limit: Overflow, try lower: 620756992/18944 08:53:48 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:48 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:48 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r7}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r7, r4}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', r7}) sendmsg$nl_route_sched(r2, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=@deltclass={0x47c, 0x29, 0x10, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r8, {0xa, 0xe}, {0xf, 0xffff}, {0xa, 0x4}}, [@tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x450, 0x2, [@TCA_CBQ_WRROPT={0x10, 0x2, {0x40, 0x1, 0x7, 0x0, 0x5, 0xa08}}, @TCA_CBQ_RTAB={0x404, 0x6, [0x4, 0x1, 0x50, 0x80000000, 0x6, 0x1, 0x9, 0x6, 0x0, 0x7fffffff, 0x20080000, 0xcd, 0x5b51, 0xc6c7, 0x0, 0xfffffff8, 0x4, 0x8, 0x8, 0x8000, 0xff, 0x5f, 0x0, 0xb2, 0x1, 0x4, 0x7, 0x380, 0x8, 0xbaae, 0x2, 0x6, 0x1, 0x7c1, 0x3, 0x100, 0x85, 0x4, 0x8a, 0x5, 0x1ff, 0x1, 0x200, 0x3, 0xff30, 0x4, 0x3ff, 0x7fa7ee57, 0xb1, 0xf605, 0xfff, 0x75, 0x7, 0x400, 0x3, 0x400, 0x5d, 0xff, 0x14c, 0x6ba, 0xf, 0x9ec, 0xffffffff, 0x3f, 0x81, 0x0, 0x7, 0x9, 0x9, 0x43, 0x401, 0x8, 0xe0b2, 0x0, 0x9, 0x4, 0x3, 0xbd4, 0xdb4, 0xffffff01, 0x4, 0x100, 0x101, 0xbc4, 0x0, 0xa5b, 0x0, 0x5, 0x101, 0x8, 0x3, 0x1, 0x45, 0x5851, 0x200, 0x0, 0x1, 0x3ff, 0x3, 0x7fffffff, 0x7f, 0x3, 0x3773, 0x10001, 0x18, 0x80000000, 0x3, 0x6, 0x7fff, 0x3, 0x30fb, 0x8, 0x3, 0x7, 0x4, 0x9f, 0x3f, 0xfffff3ef, 0x6c9d, 0x7f, 0x42, 0x1f, 0xc8, 0x9, 0x7, 0x399, 0x6e7, 0xf65, 0xf, 0x588, 0x7, 0x8, 0x0, 0x100, 0x1, 0xdf6, 0x2609, 0x80, 0x9, 0x1, 0x0, 0x3, 0x4, 0x369f, 0x8, 0x309, 0xffffffff, 0x3, 0xffffffff, 0x5, 0x8, 0xb4e, 0x6, 0x9, 0x0, 0x9, 0x8, 0x3, 0x3ffc000, 0x3, 0x6, 0x8e, 0x400, 0x4, 0x2, 0xb4c, 0x1, 0x0, 0x34, 0x20, 0x4, 0x7fff, 0x800, 0x4, 0x2, 0x1, 0x6, 0x8, 0xfffffff9, 0x3f, 0x1, 0x4, 0xfcad, 0x6, 0x1, 0x9, 0xffff8000, 0x6, 0xc12, 0x0, 0x6, 0x4, 0x9, 0x80000001, 0x1, 0x4, 0x9, 0x5, 0x2, 0x7, 0x80, 0x0, 0xffffffff, 0x5, 0x101, 0x8, 0x3, 0xef3, 0x4, 0x9, 0x6cd, 0x1ff, 0x1, 0xf6, 0x7, 0xfffffffd, 0x7, 0x1, 0x8, 0xfffffffa, 0x3, 0x9, 0x3f, 0x2, 0x23, 0x3, 0x1ff, 0x9, 0x3, 0x101, 0xffffffff, 0x8, 0x6, 0x1, 0x0, 0x400, 0x2, 0x9, 0x2, 0xcf, 0x8, 0x8, 0xffff8001, 0xea8b, 0xfffffff8, 0x6, 0x78a8, 0xa601, 0x4, 0x23f, 0x5, 0xb92, 0x3, 0x770b4549, 0x8, 0x1f]}, @TCA_CBQ_RATE={0x10, 0x5, {0x20, 0x1, 0x20, 0x4, 0x1, 0x5}}, @TCA_CBQ_LSSOPT={0x18, 0x1, {0x2f, 0x1, 0x1f, 0xff, 0x3, 0x7, 0x5, 0x8}}, @TCA_CBQ_WRROPT={0x10, 0x2, {0x3, 0x0, 0x4, 0x20, 0x4, 0x2}}]}}]}, 0x47c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000804) r9 = syz_open_procfs(0x0, &(0x7f0000000680)='sched\x00') ioctl$USBDEVFS_REAPURB(r9, 0x4008550c, &(0x7f00000006c0)) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x40000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 316.291025][T27133] xt_limit: Overflow, try lower: 620756992/18944 08:53:48 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:48 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x8}}]}) 08:53:48 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:48 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) readlinkat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000540)=""/81, 0x51) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r8, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r6, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r8, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x404c800}, 0x44050) sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r4, 0x1}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="040029bd7000fedbdf2501000000000000000c4100000014001462726f6164636173742d6c696e6b00006ebe1875c897c5a25cf249641ae1118660bb405293f17c80106fe94e9ed4380b"], 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x5) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000300)=""/198, &(0x7f0000000400)=0xc6) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000440)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d3078303030303030303030303030303063302c00aaed3b9e934b87dec66f877b0bd6ea5b8ffdb2fc95308875f7d66f1f5aa380ddd9eaeddf"]) 08:53:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0xcb85e}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x1000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 316.667369][T27162] xt_limit: Overflow, try lower: 620756992/18944 08:53:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x2000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:48 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:48 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f5, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x3000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:49 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x9}}]}) 08:53:49 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x3711c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000040)=ANY=[@ANYBLOB="6175d01675c3dbb271906c6f633d3078303030303030303030303030303063302c0006c762dd76936bc2ae2d6ee4c23f5ea346ab58982162"]) 08:53:49 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:49 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x6000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:49 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xa}}]}) 08:53:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x8000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x30020000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:49 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) open_tree(r0, &(0x7f0000000240)='./file0\x00', 0x1800) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r2 = accept4$inet(r1, 0x0, &(0x7f00000001c0), 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000200)={'team0\x00'}) 08:53:49 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota', 0xa}]}) 08:53:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x40000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:49 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xef542f267e770000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x58010000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:49 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xb}}]}) 08:53:49 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x5c8f0200}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:49 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@sha1={0x1, "2603b2282e652c922e6acab1409aa1ed900fe236"}, 0x15, 0x0) 08:53:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x5eb80c00}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:49 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x90030000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota', 0x22}]}) 08:53:50 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:50 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc}}]}) 08:53:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x4000000000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:50 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x743) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB="617504000000000000006c6f633d3078303030303030303030303030303063302c00"]) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x5b9a8000) 08:53:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0xcb85e00000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:50 executing program 0: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x100000000000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x200000000000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x300000000000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:50 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xf8f73f0000000000, 0x0, 0x38028b8, &(0x7f0000000000)) [ 318.588426][ T22] audit: type=1400 audit(1580979230.484:41): avc: denied { map } for pid=27353 comm="syz-executor.2" path="pipe:[84411]" dev="pipefs" ino=84411 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=fifo_file permissive=1 [ 318.592320][T27366] blk_update_request: I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 08:53:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x600000000000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:50 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota', 0x2b}]}) [ 318.634865][ T178] blk_update_request: I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.646359][ T178] Buffer I/O error on dev loop0, logical block 33008, async page read [ 318.654787][T27366] blk_update_request: I/O error, dev loop0, sector 264176 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 318.666862][ T136] blk_update_request: I/O error, dev loop0, sector 264176 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.678536][ T136] Buffer I/O error on dev loop0, logical block 33022, async page read 08:53:50 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xd}}]}) 08:53:50 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028f8, &(0x7f0000000100)) chdir(&(0x7f0000000040)='./file0\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x3, 0x4, 0x3, 0x641c}, {0x800, 0x29, 0xff, 0x2}, {0x5, 0x3, 0x1, 0xfffffffd}, {0x1, 0xa, 0x9, 0x8000}, {0x4, 0x8, 0x8, 0x20}, {0x6, 0x2, 0x4, 0x1}, {0x4, 0x40, 0x3, 0x8}]}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) write$binfmt_script(r0, &(0x7f00000001c0)={'#! ', './file0', [{}, {0x20, '-@:securityem1selinux'}, {0x20, '}*'}, {}, {0x20, ')em0]vmnet0'}, {0x20, ':user\\'}, {0x20, '[-/em1vmnet1@'}], 0xa, "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"}, 0x1047) [ 318.687130][T27366] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 318.698819][ T178] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.709725][ T178] Buffer I/O error on dev loop0, logical block 0, async page read [ 318.717904][ T178] blk_update_request: I/O error, dev loop0, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.728837][ T178] Buffer I/O error on dev loop0, logical block 1, async page read [ 318.736901][ T136] blk_update_request: I/O error, dev loop0, sector 264184 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.748629][ T136] Buffer I/O error on dev loop0, logical block 33023, async page read [ 318.757548][ T178] blk_update_request: I/O error, dev loop0, sector 264184 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.768915][ T178] Buffer I/O error on dev loop0, logical block 33023, async page read 08:53:50 executing program 0: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) [ 318.808995][ T178] blk_update_request: I/O error, dev loop0, sector 264184 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 318.820496][ T178] Buffer I/O error on dev loop0, logical block 33023, async page read 08:53:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x800000000000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 318.857211][T27388] EXT4-fs: 40 callbacks suppressed [ 318.857218][T27388] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x000000000000000d, [ 318.884387][T27391] EXT4-fs (sda1): Unrecognized mount option "noquota+" or missing value 08:53:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x3002000000000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 318.946382][T27394] EXT4-fs (sda1): re-mounted. Opts: 08:53:50 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f66696c653047afc3a16d83060271e13867f571970a0774f1300fd0685eebb49863dd75f82a2b38c1533aeb"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) recvfrom(r0, &(0x7f00000003c0)=""/249, 0xf9, 0x100, &(0x7f0000000100)=@nfc={0x27, 0xfffffffc, 0x2, 0x2}, 0x80) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) [ 319.001143][T27403] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x000000000000000d, 08:53:51 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xe}}]}) 08:53:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x4000000000000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:51 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:51 executing program 0: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x5801000000000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 319.326557][T27420] EXT4-fs (sda1): Unrecognized mount option "noquota+" or missing value 08:53:51 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota', 0x2e}]}) 08:53:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x5c8f020000000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 319.408639][T27433] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x000000000000000e, 08:53:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0x9003000000000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:51 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) lsetxattr$security_evm(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@v2={0x5, 0x2, 0x4, 0x260c0}, 0x9, 0x2) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mmap$usbfs(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xb, 0x20010, 0xffffffffffffffff, 0x1) prctl$PR_SET_FPEXC(0xc, 0x1) 08:53:51 executing program 0: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00', {0xffffffff00000000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 319.641941][T27456] EXT4-fs (sda1): Unrecognized mount option "noquota." or missing value 08:53:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 319.709996][T27462] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x000000000000000e, [ 319.721359][T27466] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, 08:53:51 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x10}}]}) 08:53:51 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:51 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:53:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 319.935477][T27496] limit_mt_check: 26 callbacks suppressed [ 319.935483][T27496] xt_limit: Overflow, try lower: 620756992/18944 08:53:51 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000100)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d30784e3030303030703030303030304563302c00f412d484ff878fcb6238331d555348716b0cc11f5d5719e213aa47724ff25965745562df3ef4ddf407ad6a431ffa7c5702b8543517e060eef7a374bb4828b59aab7467c9776386b545071e29"]) [ 320.027902][T27497] EXT4-fs (sda1): re-mounted. Opts: noquota, 08:53:52 executing program 0: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 320.192135][T27516] xt_limit: Overflow, try lower: 620756992/18944 08:53:52 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffefffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:52 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x2}) 08:53:52 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x11}}]}) 08:53:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 320.324981][T27526] xt_limit: Overflow, try lower: 620756992/18944 08:53:52 executing program 0: open(0x0, 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 320.433755][T27549] xt_limit: Overflow, try lower: 620756992/18944 08:53:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 320.545065][ T136] Buffer I/O error on dev loop0, logical block 33008, async page read [ 320.569644][T27559] xt_limit: Overflow, try lower: 620756992/18944 08:53:52 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 320.670004][T27578] xt_limit: Overflow, try lower: 620756992/18944 [ 320.751511][T27586] xt_limit: Overflow, try lower: 620756992/18944 08:53:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:52 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:52 executing program 2: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) sendmsg(r0, &(0x7f0000001200)={&(0x7f0000000100)=@rc={0x1f, @fixed={[], 0x10}, 0x6}, 0x80, &(0x7f0000000040)=[{&(0x7f00000001c0)="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", 0x1000}], 0x1, &(0x7f00000011c0)}, 0x8054) open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) rt_sigsuspend(&(0x7f00000011c0)={[0x1]}, 0x8) mount(&(0x7f0000001240)=ANY=[@ANYBLOB="6f11613effb30ce2e93fff8f6f4e919100bcf12711180d32d61cd099f05e0d631da79006b0e39638ffac00c47d6624d8f4c130172fd0dc142a69ad2477a31674eadbbd951b5a79b6a603475ffd2128e650d3f15f54ed86271d931f2d066225bea566d14354140b9e2b82d92fc0c9221bebf38126eef08df979a09369e8"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f00000012c0)={@broadcast, @multicast1, @loopback}, &(0x7f0000001300)=0xc) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:52 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x3}) 08:53:52 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:52 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x12}}]}) 08:53:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 320.995359][T27593] xt_limit: Overflow, try lower: 620756992/18944 08:53:52 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 321.074451][T27611] xt_limit: Overflow, try lower: 620756992/18944 [ 321.116912][T27618] xt_limit: Overflow, try lower: 620756992/18944 08:53:53 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:53 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x4}) 08:53:53 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x22}}]}) 08:53:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:53 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r1 = accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10) fstat(r1, &(0x7f00000001c0)) open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB="6175746f5f64615f616c31de3dfc3078303030303030302e30303030303063302c00"]) 08:53:53 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x25}}]}) 08:53:53 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:53 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x5}) 08:53:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:53 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:54 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:54 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x6}) 08:53:54 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) 08:53:54 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="352f66696c65305825561093d1d1e4ea32faf0db972ed26e"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f00000001c0)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d3078303030303030303030303026303063302c070051db49caa5748bbff5ef7894c76f63983435dca95fa10322fbddd4d72268273a2a5a8c0144d58c0185e24ad101568717d393150bec626e1ceb1a610d05deaa6f7e52e519a1f955ec9bf59eebb74d4d936a96e6cb6153b02801e18b5bb50b6ff807220300000000000000d0f7a6716828736e3d5addd77bff226a65d5b97560a6adb78e8144b40f2161527dace0a8c25e9585260000000000000000007013b6add9ee0f17dbe79b046089529bf690f54b155d17cb5ddd5135be53c70d45628f31470ed3c5c545850c7b464a9020b1c2f8d51c7190cc9f22d5e439b969bb1ccc7127dd4cc95629d29b7a2296be9d52b97301c4e90484cc6a46241637cd10b714d99033f225b29d00181e01"]) 08:53:54 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2e}}]}) 08:53:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:54 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:54 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x7}) 08:53:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:54 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:54 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x2}) 08:53:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:54 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x48}}]}) 08:53:54 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:54 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38428b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:54 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x8}) 08:53:54 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:55 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x3}) 08:53:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:55 executing program 2: mount(&(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES32, @ANYRESOCT, @ANYRESOCT, @ANYRES32, @ANYPTR, @ANYRES64=0x0, @ANYRESOCT]], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x80c0}}]}) 08:53:55 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4c}}]}) 08:53:55 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:55 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x9}) 08:53:55 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x4}) 08:53:55 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000100)={0x3, 0xfffffffa, 0x1, 0x0, 0xc}) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file2'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c500c, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:55 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x60}}]}) 08:53:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:55 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 323.890867][T27912] EXT4-fs: 39 callbacks suppressed [ 323.890875][T27912] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000060, [ 323.908133][T27903] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 323.938888][T27926] EXT4-fs (sda1): Unrecognized mount option " " or missing value 08:53:55 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:56 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0xa}) 08:53:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 324.273285][T27903] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 324.320637][T27912] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000060, 08:53:56 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x5}) 08:53:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:56 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000040)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d307830303030303030305f6e40fb36a688886aa730303030303063302c00"]) [ 324.379712][T27956] EXT4-fs (sda1): Unrecognized mount option " [ 324.379712][T27956] " or missing value 08:53:56 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x68}}]}) 08:53:56 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./fi'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 324.690840][T27956] EXT4-fs (sda1): Unrecognized mount option " [ 324.690840][T27956] " or missing value 08:53:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:56 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) [ 324.750610][T27985] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000068, [ 324.763879][T27986] EXT4-fs (sda1): Unrecognized mount option "" or missing value 08:53:56 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0xb}) 08:53:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 324.809112][T27988] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=0x00000000_n@û6¦ˆˆj§000000c0" or missing value 08:53:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 325.017396][T28036] limit_mt_check: 32 callbacks suppressed [ 325.017401][T28036] xt_limit: Overflow, try lower: 620756992/18944 08:53:57 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x6}) 08:53:57 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x6c}}]}) 08:53:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:57 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0xa00, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:57 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 325.144043][T28047] xt_limit: Overflow, try lower: 620756992/18944 08:53:57 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0xc}) 08:53:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 325.286169][T28054] xt_limit: Overflow, try lower: 620756992/18944 08:53:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 325.404481][T28064] xt_limit: Overflow, try lower: 620756992/18944 [ 325.431327][T28059] print_req_error: 3 callbacks suppressed 08:53:57 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) [ 325.431340][T28059] blk_update_request: I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 325.469429][ T178] blk_update_request: I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 325.485237][ T178] Buffer I/O error on dev loop0, logical block 33008, async page read 08:53:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 325.520683][T28079] xt_limit: Overflow, try lower: 620756992/18944 08:53:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 325.574588][T28088] xt_limit: Overflow, try lower: 620756992/18944 [ 325.665856][T28098] xt_limit: Overflow, try lower: 620756992/18944 08:53:57 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x74}}]}) 08:53:57 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x7}) 08:53:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:57 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_CLAIM_PORT(r1, 0x80045518, &(0x7f0000000040)=0x9) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 08:53:57 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:57 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0xd}) [ 326.017612][T28122] xt_limit: Overflow, try lower: 620756992/18944 08:53:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 326.168687][T28134] xt_limit: Overflow, try lower: 620756992/18944 08:53:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:58 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) [ 326.309087][T28148] xt_limit: Overflow, try lower: 620756992/18944 08:53:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:58 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7a}}]}) 08:53:58 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="53305ae4788b9fa1b22bb87fceced9879bce4fe2c4b7b5d55e17ba26d2564cb931250ddcb46053b364dfbd060cd908f917a054cc17fd88e1226e4e708582e1c00dd1a63160ef13c24b4f4612"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000040)) 08:53:58 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x8}) 08:53:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:58 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], 0x0, 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:58 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0xe}) 08:53:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 326.865319][T28203] blk_update_request: I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 326.881857][ T178] blk_update_request: I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 326.894064][ T178] Buffer I/O error on dev loop0, logical block 33008, async page read [ 326.905200][T28203] blk_update_request: I/O error, dev loop0, sector 264176 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 326.917693][ T136] blk_update_request: I/O error, dev loop0, sector 264176 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 326.929859][ T136] Buffer I/O error on dev loop0, logical block 33022, async page read [ 326.938527][T28203] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 326.950707][ T136] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 326.962327][ T136] Buffer I/O error on dev loop0, logical block 0, async page read 08:53:58 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x124}}]}) 08:53:58 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40501, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000000010319", 0x7}], 0x1) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:53:58 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) [ 327.029176][ T136] blk_update_request: I/O error, dev loop0, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 327.040855][ T136] Buffer I/O error on dev loop0, logical block 1, async page read 08:53:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:59 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:59 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x9}) 08:53:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:59 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x300}}]}) 08:53:59 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x10}) 08:53:59 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:53:59 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) ioctl$SIOCGETLINKNAME(r0, 0x89e0, &(0x7f0000000100)={0x3, 0x3}) 08:53:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:59 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x500}}]}) 08:53:59 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0xa}) 08:53:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:53:59 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:00 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x11}) 08:54:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:00 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) mount(&(0x7f0000000900)=ANY=[@ANYRESHEX=0x0, @ANYBLOB="714b4097553cfa1d2e953b815bb8b6b15182a5b3f8774fcadfc341e97e90625c7055603bcf8faba3ed6f88656d8e9e905ef4d8f37e192d0b19965eb0ce394b25fe7f34502f76320197486a8db00ef8ed3e9ab5a8710daf46adb001be0a2d6b87dc731fd7f9644026572de15b", @ANYBLOB="3a85b800e758d88ae8b3d163b479b09c55acef54bb6344fb6ba5342cb3da97cac1434ad7f0282b7e11f8a6e43ddf9f7c96327a8bc4b6f49c5dfda5ae6e406d6579cc95defa489889c819c7939e9d8ba42f4696f3ed1d1970584aa45e98eaf66f7daf7b99f93279d73c4c666a692a95c06ef1ebe371d72702568e0a731b11d82fdb15407b06fba0398f716f82eefba8552e5cf53870c91f9d70d03db24426b47f1186f9ae90e2f85c50f6ce048b77b5b7804d29a91347535e3d42df89b501603a6a34d94db1743f44cdf2959e27f457de2ebd525358d74253f6a0b735f7c11969e83fc7", @ANYBLOB="728e685473690060661e472ddd89120a2535537f8b1f2e58967274455dbe1c63e5237ac3f347abd8815240e0846480b76986471c9fbfb5bf4deb1c4137e80b9e87dee63a02", @ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESDEC], @ANYPTR=&(0x7f0000000800)=ANY=[@ANYRES32=0x0, @ANYPTR=&(0x7f0000000780)=ANY=[@ANYRES16=r1], @ANYRES16, @ANYRESHEX=r1, @ANYBLOB="995c0d615bf008bd83da9f16f370bead07121769eed7eac7fb7dcf96d253e08387534a5c5748b7b8c13906c6ebf89f897b76c7b3727390abf2c9622ddf527d3aa7ea7aee35f730b466f3f2e005402e01601f165aad4a418993ca1fa8bbeba5bc35f013ecd967786a7e0d9560662bed80112e85fa56f0f31bb3cb2a2213c9eb15f3e9d9b59087d3821f0bb87c77bf68d0c3d08c17280debe19ec525b986da3480", @ANYRESDEC=r0, @ANYPTR=&(0x7f00000007c0)=ANY=[@ANYPTR, @ANYRESHEX=r3, @ANYPTR64, @ANYRES64=r4, @ANYRESDEC=r5], @ANYRESHEX=r6], @ANYRESDEC=0x0], &(0x7f00000006c0)='./file0\x00', 0x0, 0x3ae588c, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r10 = getpid() sched_setattr(r10, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000680)={0x21, 0x37, 0x1, {0x0, 0x3d8000000000, 0xffffffff, r10, 0x3, 'CT\x00'}}, 0x21) ptrace$getregset(0x4204, r9, 0x3, &(0x7f0000000640)={&(0x7f0000000600)=""/32, 0x20}) ioctl$LOOP_GET_STATUS64(r8, 0x4c05, &(0x7f00000001c0)) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) capset(&(0x7f0000000040)={0x20071026, r11}, &(0x7f0000000140)={0x7, 0x2, 0x7, 0xb42, 0x7f, 0x5}) 08:54:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:00 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x600}}]}) [ 328.523942][T28366] capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure 08:54:00 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:00 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0xb}) 08:54:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:00 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x675}}]}) 08:54:00 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@gcm_128={{0x304}, "18ec94a71ea43031", "1462ee287ddbfd5d53f2f84aeb7ef80c", "e1e14cdc", "efde0e88aa16965b"}, 0x28) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 329.011477][T28415] EXT4-fs: 44 callbacks suppressed [ 329.011485][T28415] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000675, [ 329.029469][T28423] EXT4-fs (sda1): Unrecognized mount option " " or missing value [ 329.069100][T28420] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 329.110292][T28435] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000675, [ 329.119876][T28432] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, 08:54:01 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x12}) 08:54:01 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:01 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0xc}) 08:54:01 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x700}}]}) 08:54:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 329.254282][T28446] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value 08:54:01 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 329.381408][T28455] EXT4-fs (sda1): Unrecognized mount option " " or missing value 08:54:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 329.440563][T28463] EXT4-fs (sda1): Unrecognized mount option "" or missing value [ 329.502981][T28474] EXT4-fs (sda1): Unrecognized mount option "auto_da_alloc=4x00000000000000c0" or missing value 08:54:01 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 329.549993][T28475] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000000700, 08:54:01 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0xd}) 08:54:01 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x22}) 08:54:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:01 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x900}}]}) 08:54:01 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 330.050692][T28527] limit_mt_check: 37 callbacks suppressed [ 330.050697][T28527] xt_limit: Overflow, try lower: 620756992/18944 08:54:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 330.189515][T28541] xt_limit: Overflow, try lower: 620756992/18944 08:54:02 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="0200000000653076af4a02d05e0d945676"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r7}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r7, r4}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={r7, @multicast1, @local}, 0xc) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x80, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x1, 0x2, 0x9, 0x2, 0x0, 0x6, 0x40201, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x5, 0x4}, 0x4100, 0x9, 0xffffffff, 0x0, 0xdfe5, 0x9, 0xfff}, 0x0, 0x0, r8, 0x3) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x234000, 0x0) r12 = socket(0x11, 0x800000003, 0x0) bind(r12, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a0800000003ff5f163ee340b7679d0015795027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ffc2c6540000000000000000000000000000000000008eff00"}, 0x80) getsockname$packet(r12, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) r13 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340)='ethtool\x00') accept4$packet(r11, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000003c0)=0x14, 0x800) r15 = socket(0x11, 0x800000003, 0x0) bind(r15, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a0800000003ff5f163ee340b7679d0015795027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ffc2c6540000000000000000000000000000000000008eff00"}, 0x80) getsockname$packet(r15, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000002a00793a0087000000008009000000df", @ANYRES32=r16], 0x2}}, 0x0) r17 = socket(0x11, 0x800000003, 0x0) getsockname$packet(r17, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000980)=ANY=[@ANYBLOB="7d47b7db075a7b13c387f200000080090000e4defd7dd72336290096edc13ca48fecc7b6be4fe67f50d9bf532066362dd5682965a9980dd5e056b59059e868fc07f6dd114884a602710731629017d657d329e1cf88692923f127f39548f9030e211fa8cf5e87c1bb70029d4777591075de5ee53a7f207511e33c0ad9dfa426643bca820d8736ee927ae2168925fb2fcb7ae9f1cdd8d132dff9f3036f9705183eab514a0ee8313367bcf7ab0de9a0eb3997ed618418ad7f67e161f44fb1e9c26b989902b88ac9244cbf753351bc74b113733e3f24d5d3ac05bcf0e9c67309c178806b7d203efeaa08efa37825e4", @ANYRES32=r18], 0x2}}, 0x0) r19 = socket(0x11, 0x800000003, 0x0) bind(r19, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a0800000003ff5f163ee340b7679d0015795027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ffc2c6540000000000000000000000000000000000008eff00"}, 0x80) getsockname$packet(r19, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a80)=ANY=[@ANYBLOB="240000002a006b8bc387000000008009000000df2a5a1f102a7288615d40b982bf60427a4be3277f1c44b57965b8d38891e70af9abade588dafc4affda837404949e25a8e4b9a14f6e8e4eae61810e9168d4744cc23ada88f6f3105f765884a4ec1bdd5894906ba2e211ec6112d0d68b97a7e30d642bd371c602165d783451002566ffafdc7012d4331997525b5659e3ea4055e2a3fa5a715ced4472bb9bd7268518083c8e9c29d3e000685dfc597e0bfd64a7bc45aed535d594646c9b94bf1489f3076be4a281f1d041505fd16c6f4d2edc7b1b54eab131617c0ccbf3eb", @ANYRES32=r20], 0x2}}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r22, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r22) splice(r21, 0x0, r22, 0x0, 0x100000000, 0x0) getsockopt$inet_pktinfo(r22, 0x0, 0x8, &(0x7f0000000540)={0x0, @dev, @empty}, &(0x7f00000006c0)=0xc) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r12, &(0x7f0000000940)={&(0x7f0000000300), 0xc, &(0x7f0000000900)={&(0x7f0000000b80)=ANY=[@ANYBLOB="78010000", @ANYRES16=r13, @ANYBLOB="000226bd7000fedbdf250200000048000180140002007866726d30000000000000000000000008000100", @ANYRES32=r14, @ANYBLOB="14000200000000000000000000000000000000001400020076657468305f766972745f7769666900180001801400020069703665727370616e300000000000004400018008000100", @ANYRES32=r16, @ANYBLOB="140002006d6163767461703000000000000000000800030002000000140002006e72300000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="8c000180080003000100000008000100", @ANYRES32=r18, @ANYBLOB="1400020076657468300000000000000000000000147468305f746f5f6873720000000008000300010000001400020076657468315f746f5f6873720000000008000100c01d6028ac38c76f5acb6e5bad761e5a810d0ad9e5caac6384db8bcd1b995e60431b1c2b6d02c897d00643719de5a21a28a09188782826af43b7b53d842782fd2ed123e9ab", @ANYRES32=r20, @ANYBLOB="08000100", @ANYRES32=r23, @ANYBLOB="1400020069703665727370616e30000000000000080003000200000008000300000000003400018008000300010000001400020073797a5f74756e00000000000000000014000200"/88], 0x178}, 0x1, 0x0, 0x0, 0x4040000}, 0x40800) r24 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r24, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r27 = dup(r26) getsockname$packet(r27, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r28}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r28, r25}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x1, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x20004, 0x9, 0x7f}}, 0xe8) r29 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r29, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r32 = dup(r31) getsockname$packet(r32, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r33}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x5, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r33, r30}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x1, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) r34 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r35 = dup(r34) ioctl$PERF_EVENT_IOC_ENABLE(r35, 0x8912, 0x400200) getsockopt$inet6_mreq(r35, 0x29, 0x1c, &(0x7f00000027c0)={@ipv4={[], [], @empty}, 0x0}, &(0x7f0000002800)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r10, &(0x7f00000028c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000002880)={&(0x7f0000002840)={0x40, r13, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r28}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r33}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r36}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x5001}, 0x10) r37 = signalfd(r2, &(0x7f0000000100)={[0x9c20]}, 0x8) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000140)=[r37, r0], 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB="88"]) 08:54:02 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:02 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x25}) 08:54:02 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0xe}) 08:54:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 330.390121][T28550] xt_limit: Overflow, try lower: 620756992/18944 08:54:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:02 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xa00}}]}) [ 330.500067][T28563] xt_limit: Overflow, try lower: 620756992/18944 08:54:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:02 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) [ 330.549904][T28573] xt_limit: Overflow, try lower: 620756992/18944 08:54:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 330.650450][T28585] xt_limit: Overflow, try lower: 620756992/18944 08:54:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 330.735996][T28600] xt_limit: Overflow, try lower: 620756992/18944 08:54:02 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x2b}) [ 330.866821][T28608] xt_limit: Overflow, try lower: 620756992/18944 08:54:02 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_00000000000c0,\x00'/34]) chmod(&(0x7f0000000040)='./file1\x00', 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0)='ethtool\x00') 08:54:02 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xb00}}]}) 08:54:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:02 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x10}) 08:54:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 331.033363][T28619] xt_limit: Overflow, try lower: 620756992/18944 08:54:03 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 331.210300][T28634] xt_limit: Overflow, try lower: 620756992/18944 08:54:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:03 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x2e}) 08:54:03 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc00}}]}) 08:54:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:03 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:03 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRESDEC, @ANYRESHEX=r0]], &(0x7f0000000180)='./file0\x00', 0x0, 0x10000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:03 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x11}) 08:54:03 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xd00}}]}) 08:54:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:03 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x48}) 08:54:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:04 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:04 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) write$rfkill(r0, &(0x7f0000000040)={0xff, 0x2, 0x2}, 0x8) 08:54:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:04 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x12}) 08:54:04 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x4c}) 08:54:04 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:04 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xe00}}]}) 08:54:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:04 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) socket$unix(0x1, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f66010000000100000091cfb77e6db0742b627fa3920773f46f1d9d5e4c3aad9af0442e597cda4b6bd4"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:04 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:04 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x60}) 08:54:04 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x324c2, 0x4) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:04 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x22}) 08:54:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:05 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x1100}}]}) 08:54:05 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:05 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x68}) 08:54:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:05 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:05 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="0937343a687a539d629626f71edef6bc11bacfdcd3cc65da0b75f0fbfd228f745136f5b5d964e6a3a4643ac628f818888ff7d57c2e5052a217c7e99000e4d3b48a53c9ef7db2466ed35016eb87746c44207607b987f0189b33169cb0f41753a2b9ee0a0f0db46f85ffecfd38daca6e29bb5322faacecaff337a6a794b9ee62a3a5e9723195ebfc5d75fe72f658fc92563e901f58b7d0ef2a962bf74a14237024f3a45d0701236b4c457d2878ef128b65d657a8cfe5af7a6d1f745ef70d2350e8c403a3cf572d2e8d56df9ec0ccfc9779"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)={0x53, 0x1f, 0xafc0, {0x0, 0x8}, {0x1000, 0x800}, @period={0x5b, 0x1000, 0x7, 0x100, 0x80, {0x7, 0x319, 0x40, 0x3}, 0x6, &(0x7f0000000000)=[0x800, 0x1, 0x832, 0x7, 0x5, 0xf649]}}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f00000001c0)=ANY=[@ANYBLOB="6175746f5f64615f616c6c6f633d3078303030303030303030303030303063302c00ab393d01c500d244dafd5ddc0028db7573c702e865a151bc397c76fd82b6ec301dabd73b5ce181e9f2b66f19877862f4e38f8d1d5729b0939c52a6e742ab3cbdfe48f24002da1c5dc1cba0ae5ba0320a4f33bc3283130743c5fdddbe51be0c6d49bdcec94928c501"]) 08:54:05 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x25}) 08:54:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:05 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x1200}}]}) 08:54:05 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x6c}) 08:54:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:05 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:05 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3b020b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:05 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:05 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x74}) [ 334.202099][T28960] EXT4-fs: 57 callbacks suppressed [ 334.202108][T28960] EXT4-fs (sda1): Unrecognized mount option "t" or missing value [ 334.240191][T28965] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, [ 334.249045][T28966] EXT4-fs (sda1): Unrecognized mount option "%" or missing value 08:54:06 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x1f00}}]}) 08:54:06 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x48}) 08:54:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:06 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x00000000000000c0,\x00']) 08:54:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:06 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0x7a}) 08:54:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:06 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB="6175732da2cf458137a85a1b795e509021746f5f64615f616c6c6f633d3078303030"]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000100)) [ 334.420854][T28987] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000001f00, 08:54:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:06 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, 0x0) 08:54:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 334.625950][T29006] EXT4-fs (sda1): Unrecognized mount option "z" or missing value [ 334.663927][T29014] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000001f00, 08:54:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:06 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2000}}]}) [ 334.678504][T29018] EXT4-fs (sda1): Unrecognized mount option "H" or missing value [ 334.708801][T29021] EXT4-fs (sda1): Unrecognized mount option "aus-¢ÏE7¨Zy^P!to_da_alloc=0x000" or missing value [ 334.759028][T29032] EXT4-fs (sda1): Unrecognized mount option "z" or missing value [ 334.799957][T29029] EXT4-fs (sda1): re-mounted. Opts: 08:54:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:06 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x4c}) 08:54:06 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0xe0}) 08:54:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 335.092116][T29060] limit_mt_check: 31 callbacks suppressed [ 335.092120][T29060] xt_limit: Overflow, try lower: 620756992/18944 08:54:07 executing program 2: ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000040)={0x8, 0x26, 0x0, 0xffffffffffffffff}) r1 = eventfd(0x7) r2 = fcntl$dupfd(r0, 0x406, r1) open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@initdev={0xac, 0x1e, 0x1, 0x0}, @multicast2, 0x0, 0x2, [@loopback, @empty]}, 0x18) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:07 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, 0x0) 08:54:07 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2200}}]}) 08:54:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 335.283044][T29067] xt_limit: Overflow, try lower: 620756992/18944 08:54:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 335.368200][T29088] xt_limit: Overflow, try lower: 620756992/18944 [ 335.406272][T29098] xt_limit: Overflow, try lower: 620756992/18944 08:54:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 335.502879][T29104] xt_limit: Overflow, try lower: 620756992/18944 08:54:07 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x60}) 08:54:07 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, 0x0) 08:54:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 335.665443][T29117] xt_limit: Overflow, try lower: 620756992/18944 08:54:07 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000100)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r7}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r7, r4}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000600)={[], [{@uid_lt={'uid<', r2}}, {@fowner_lt={'fowner<', r4}}, {@dont_hash='dont_hash'}]}) 08:54:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:07 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}], [], 0xff}) [ 335.745008][T29134] xt_limit: Overflow, try lower: 620756992/18944 08:54:07 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2401}}]}) [ 335.786448][T29138] xt_limit: Overflow, try lower: 620756992/18944 08:54:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 335.935548][T29145] xt_limit: Overflow, try lower: 620756992/18944 [ 335.959412][T29140] blk_update_request: I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 08:54:07 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[]) [ 335.989062][ T178] blk_update_request: I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 336.000451][ T178] Buffer I/O error on dev loop0, logical block 33008, async page read 08:54:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 336.046753][T29160] xt_limit: Overflow, try lower: 620756992/18944 08:54:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:08 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x68}) 08:54:08 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000100)=ANY=[@ANYPTR], &(0x7f0000000180)='./file1\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x408040, 0x0) 08:54:08 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[]) 08:54:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:08 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) ftruncate(r0, 0x5) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) pwritev(r1, &(0x7f0000000580)=[{&(0x7f0000000180)="d1389912cd12e2d9e85f71ceacf0faed7bcf11255239187bc314f86cca4c404d3d60be9d0ceaffd5d89edce00d342391dea60755485145238259c831c5c076c39c183b6a32f5ed11ecf14ace7af38816e02cef8c3d26a84c0c5e5f32d12a3f2525d8398b747c2e4570a81007fce4b8e94ac347bbf9bd480554591f7fa7f89f9dcf2737379d60fe4942b939042c258eb42dffdd1ca1de21f0", 0x98}, {&(0x7f0000000240)="63e8678734fee4ae92ffa7a6d2bf63aa1f8738161c0d4266ec50435673d1d3b0a6ab0ffdb5a3c3978f12653b8ff3f8735c82d60997d2ce5a1df04a339f6d17b85278914093d5a4643ece5d20e3dbddd7d218ef9a95a88dfea3b64d5757d20cb16912a74ab513424b55f67ebba6ed55ee8a3e8c96930b7d998615f374171d620001fbfa3c484186f0d8b65e9ecf974057fad4d0ea67f669731876b52113003558cb17dfe8063c3cc420755e01920872b61510b88fc8a8eaa5c1ea6ab4e7aaf8911b69", 0xc2}, {&(0x7f0000000340)="9a0d5ee433b98b2bdeb8426b1948df55071ce0b4588298679b3337bfad862925628675d2019319653b9ce6c9dfa14d5310182ef6372e611d7ae21487af6f10859009d305c9809b9d6abe617cd8b407582e0597c2b8aa41be9c6a4375b2769982a658d8249c8cc0758df5712f62172f588e53a50011cd3eb91c8a303add79f10d7c9a93dd7be08516488d341d97e092b3bb0cdef00422cb371ee87986ee80ca28ab7633297a17e940c94a4f072cd8ac4b8410682e4f45f3351b5e8a49e0c335", 0xbf}, {&(0x7f0000000400)="6f606e4b9a0a7bec315de097beceb90cf4ba53b056cb6823a581582df00dd2decd68952b77bffdb12da67a07254906d4e41c4e6788e91bd84d552d7e50600141fd72d3cd439c461bc73e0b64b3ea8eab33b01d4c344f3fd6250db85a951db5c5baed9e57577106771444f4d11808cb69dcbe2346b79bbe03cdac895664ea6c4b8360eb243f4d0ec4b08e7b3886f0b18095112c72cca7fccaf133a718d92c3067910c3fe6efb167ac7140596b5fe445ed14d1e2e59214cead74192801b4fe80c68b", 0xc1}, {&(0x7f00000000c0)="168073558e5c5f6b2d1f0c59b735bc9d", 0x10}, {&(0x7f0000000500)="0af11d841f159098699fdd98abf48a9bc90800be049dd86a1162846dd18bbb147af1fb172a8e500f1ca07a938ad5e72e8fbb0d1fea5a07abb6de5faba1ea0722343faaef202a93721d4bc217749431a840f5bd70f2c3989ad08284b6ed8249cbae1b404dc4bc388c512ada9a", 0x6c}], 0x6, 0xff) 08:54:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:08 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2500}}]}) 08:54:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:08 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[]) 08:54:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:08 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x6c}) 08:54:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:08 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/103, 0x67) r0 = creat(&(0x7f00000001c0)='\x00', 0x42) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) recvmsg$can_raw(r0, &(0x7f00000007c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000280)=""/110, 0x6e}, {&(0x7f0000000300)=""/5, 0x5}, {&(0x7f0000000340)=""/198, 0xc6}, {&(0x7f0000000440)=""/241, 0xf1}, {&(0x7f0000000540)=""/62, 0x3e}, {&(0x7f0000000580)=""/3, 0x3}, {&(0x7f00000005c0)=""/90, 0x5a}], 0x7, &(0x7f00000006c0)=""/245, 0xf5}, 0x40000003) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @multicast1}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000a00)=0xe8) sendto$packet(r1, &(0x7f0000000800)="e88e7f3612b70506199558890fa79497de8ceff1f19dabf60545346b49c5dfa738359a31a0e16902673eb6bf5124684448f2173805c62edc5636bddb18c87f49a6d5901e2eb3a53749b29aa69753687e8af07d10cce4dc253b77b4cc52ff2f6c5ee9a4f2421cd6f48eec6e2df120700c94988a1854bff5a4491364470723d33c8f80130f9274486d45eb5e1a0c0bb9dcbffb80a408d1aacfcae297354d7ccf2e9c3a999a6f18aaefda97415e244071eb57919047286ff8580006697a25e3f663b46e50c63c67dee612cefee0f70f", 0xce, 0x20004881, &(0x7f0000000a40)={0x11, 0xf8, r4}, 0x14) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:08 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB]) 08:54:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:08 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1001004, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r3, r1, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r0, r3) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) getsockname$packet(r7, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r8}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r8, r5}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x8d0404, &(0x7f0000000500)={[{@noquota='noquota'}], [{@uid_eq={'uid', 0x3d, r0}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@obj_user={'obj_user', 0x3d, '/selinux/enforce\x00'}}, {@fsname={'fsname', 0x3d, '#!*md5sum{eth0,'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'noquota'}}, {@seclabel='seclabel'}, {@euid_eq={'euid', 0x3d, r5}}, {@smackfsdef={'smackfsdef', 0x3d, 'noquota'}}, {@dont_appraise='dont_appraise'}, {@appraise='appraise'}]}) 08:54:09 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2bc0}}]}) 08:54:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:09 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB]) 08:54:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:09 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x74}) 08:54:09 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$inet6(r1, &(0x7f0000001280)={&(0x7f00000000c0)={0xa, 0x4e22, 0x101, @local, 0x2}, 0x1c, &(0x7f0000001200)=[{&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="9a2ff228c9b35c10adc0dd0afe70775885ee13a81a0909d385ccc2129220de6729f5395eb63701d1653cc171c9d4d37b624349a06331d89be8a0eea31dbdb1814d663dee9b4c5a99af0a15ccc952d2a8e6cd6ec46789f512b50f02b3e9cc55083e185f898c4230f63f8b3a17dd76f18c", 0x70}], 0x2, &(0x7f0000001240)}, 0xc004) 08:54:09 executing program 2: prctl$PR_SET_THP_DISABLE(0x29, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 337.659348][T29308] blk_update_request: I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 08:54:09 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB]) 08:54:09 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2e00}}]}) [ 337.719248][ T136] blk_update_request: I/O error, dev loop0, sector 264064 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 337.731017][ T136] Buffer I/O error on dev loop0, logical block 33008, async page read 08:54:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:09 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x2, 0x3, 0x248, 0xd8, 0x0, 0xd8, 0x0, 0xd8, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz1\x00', {0x10000}}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x7f, 'snmp_trap\x00', 'syz0\x00', {0x401}}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2a8) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000180)={{0x2, 0x4e22, @broadcast}, {0x306, @broadcast}, 0x8, {0x2, 0x4e22, @multicast1}, 'tunl0\x00'}) lseek(r0, 0x7fff, 0x2) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:09 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)={[{@stripe={'stripe', 0x3d, 0x6}}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@noauto_da_alloc='noauto_da_alloc'}, {@nodiscard='nodiscard'}]}) 08:54:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:10 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x7a}) 08:54:10 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=4x0']) 08:54:10 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4000}}]}) 08:54:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 338.164458][T29380] xt_CT: You must specify a L4 protocol and not use inversions on it 08:54:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:10 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:10 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) signalfd4(r0, &(0x7f0000000180)={[0x6]}, 0x8, 0x800) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_GETXATTR(r2, &(0x7f0000000100)={0x18, 0x0, 0x4, {0x50}}, 0x18) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e6f71612cb90d4fb10a3e2f332a00c72af3c2e1e36edbf06a9dc08cc89251"]) 08:54:10 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB]) 08:54:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 338.476739][T29416] xt_CT: You must specify a L4 protocol and not use inversions on it 08:54:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:10 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0xff}) 08:54:10 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4800}}]}) 08:54:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:10 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB]) 08:54:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:10 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f66696c653000814d7d8b19e94e70daa707fec13177a82a8e8d8968bca28c77bb84a084134944cb0dde1a9b61e56fa83961c307ce373f3c448beb5eab2c2f6199d77594f217583bfcba03da234769b29c4f747e7cc9e64c603842f5eb7b3d76c039b9948302683b614f36776601f5bef0c5ae234d814140f5c8530126c2ded8b270dac22ce774995334eaffa3a72de5e20c71a2698d1098bef1f7455084f6fc760779a06b994d44d51f15103c1900c260190f06e59249d4d74a2d6c63c7cf770c0951de"], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2ee4, 0x0, 0x0, 0x32b8cf4, &(0x7f0000000040)={[{@noquota='noquota'}]}) 08:54:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:10 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000040)={{0x1, 0x0, @descriptor="aa8e55b2af5209a2"}}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:10 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB]) 08:54:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:11 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4c00}}]}) 08:54:11 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000100)=ANY=[@ANYBLOB="00e49234cf926d2e912916e6249fdcea150fd38d364dbff93a5568e3bc1b8de05a2a57376d075ee4b3a95b54f9b692adb7716748fbe7630f35c777732fc4d0550295321f70d398b671c727"]) 08:54:11 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 339.318283][T29504] EXT4-fs: 63 callbacks suppressed [ 339.318292][T29504] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, 08:54:11 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_a']) 08:54:11 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) r0 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000001c0)={0x0, 0x0, 0x6, 0x0, [], [{0x1be, 0x40, 0x5, 0x5, 0x1ff, 0xc5}, {0x8, 0x8, 0x8, 0x40, 0x3, 0x81}], [[], [], [], [], [], []]}) [ 339.558747][T29522] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000004c00, 08:54:11 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x4, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 339.602990][T29534] EXT4-fs (sda1): Unrecognized mount option "auto_da_a" or missing value 08:54:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 339.650148][T29541] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000004c00, 08:54:11 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='a']) 08:54:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 339.701308][T29551] EXT4-fs (sda1): re-mounted. Opts: [ 339.709171][T29549] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, 08:54:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 339.755765][T29552] EXT4-fs (sda1): re-mounted. Opts: noquota, 08:54:11 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x6000}}]}) [ 339.885671][T29571] EXT4-fs (sda1): Unrecognized mount option "a" or missing value [ 339.922119][T29576] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 339.929646][T29561] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, 08:54:11 executing program 3: setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000280)={@loopback, @broadcast, 0x0, 0x2, [@dev={0xac, 0x14, 0x14, 0x32}, @dev={0xac, 0x14, 0x14, 0x20}]}, 0x18) open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000200)) getsockopt(r0, 0x9, 0xffffffff, &(0x7f0000000100)=""/77, &(0x7f0000000040)=0x4d) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_misc(r2, &(0x7f0000000240)={'syz0', "c6ab6ae053232427eeed8889746e0692a859bc5271c06e3586527d6bcc8c3074ffe68c54c99d432b827548"}, 0x2f) 08:54:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:11 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) mount(&(0x7f0000000640)=ANY=[@ANYPTR64, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYBLOB="bafb3d3e953806bc020ec53a14fec69f5737196a999cf7bce7d819f32585ebd60741f0e3231eb634190b9ab55206cbf4ebb78d7fa58dc317a74b8b2f27d9d03b901d66178bb8613e685e15602ad68dd12e61271ac190f14f288ffbec6f09d3637a80cec9d37b2aa81fd7519af20e7f2e0d0965b459afbb67c39ec2fd1f27067b40336db5cef241409d9747ef8497f6574f9f149f2be602e2ea0f6bcbb09cc6fd54c3e944b328d030ba39a66bec71238e035eec2e615c5882b97af36171a12106fa0b62c202e3263be83951280a854dbcd387c648af54aeee51351d705e6e9f5e36ac1acc", @ANYRES16=r1, @ANYRES64]]], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x400, 0xa4) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auo_doc=0x00000000000000\x00']) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r6 = dup3(r5, r2, 0x0) ioctl$LOOP_SET_CAPACITY(r6, 0x4c07) openat$cgroup_subtree(r0, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) open_tree(r4, &(0x7f0000000040)='./file0\x00', 0x0) 08:54:11 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:11 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB]) 08:54:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 340.222273][T29605] limit_mt_check: 37 callbacks suppressed [ 340.222277][T29605] xt_limit: Overflow, try lower: 620756992/18944 08:54:12 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x6800}}]}) [ 340.291169][T29614] xt_limit: Overflow, try lower: 620756992/18944 08:54:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:12 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0xa9) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) mount(&(0x7f0000000600)=ANY=[@ANYBLOB="0020c908aa14c76d7ea426234d504b00000000006ef71a3a805cea462e4e3d056abed52b7214b3eb04c21f44c93bf280e8a9fbf55f226978e5a74101be833b2b1d06feeff8ced7ff4f4f9089e4ee75daf42ed4bcba4dad3095972160b558f4e73399f407a6024207efc12f6c8f84823db044ff94fda440a39ea92f0314490f4b4b5174261e44dd08b2bdf2430e42cf127f5bd22066f920cb00"/170], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) [ 340.339257][T29622] xt_limit: Overflow, try lower: 620756992/18944 08:54:12 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB]) [ 340.395723][T29631] xt_limit: Overflow, try lower: 620756992/18944 [ 340.399970][T29632] xt_limit: Overflow, try lower: 620756992/18944 08:54:12 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='k']) 08:54:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 340.458874][T29631] xt_limit: Overflow, try lower: 620756992/18944 [ 340.459207][T29632] xt_limit: Overflow, try lower: 620756992/18944 [ 340.478896][T29647] xt_limit: Overflow, try lower: 620756992/18944 [ 340.480417][T29648] xt_limit: Overflow, try lower: 620756992/18944 08:54:12 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000740)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000780)={0x28, r2, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_DST={0x14, 0x1, @mcast2}]}, 0x28}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x34, r2, 0x800, 0x70bd2d, 0x25dfdbff, {}, [@SEG6_ATTR_DSTLEN={0x8}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x4, 0x4, 0x1, 0x5, 0x1a3b4e9f]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004840}, 0x8011) open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, &(0x7f0000000000)=0x2, 0x4) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000240)=ANY=[@ANYBLOB="6175746f5f64615f616c6c3030303063302cd54d0186b100860d98569d20661ff8d17fbec79db85096b14e3eca4eecae58e6c9204f2e2fb60878eefdf2ec5cdb637dc72d37b4420029954a78c618c6238e281b89dda93bd16987d8f6b8ca98cb2b22028f2658c14d494dc404fc7a0f352efa4971836d0ec26299974011b8670fd3170fa26b85a1fab0923a93094968e46d94d24c979c"]) 08:54:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 340.603975][T29659] xt_limit: Overflow, try lower: 620756992/18944 08:54:12 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) write$binfmt_elf32(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x80, 0xe0, 0xd1, 0xff, 0x7fff, 0x2, 0x3e, 0x9, 0x85, 0x38, 0xffffffff, 0x0, 0x4, 0x20, 0x2, 0x3, 0x4, 0x4}, [{0x2, 0x85f5, 0x4, 0x7a84, 0x0, 0x8, 0xfd84, 0x1}], "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", [[], [], [], [], [], [], []]}, 0x1758) 08:54:12 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB]) 08:54:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:12 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x6c00}}]}) 08:54:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:12 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RLINK(r0, &(0x7f0000000100)={0x7, 0x47, 0x1}, 0x7) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:13 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f66696c65300f590a9028ea314e375814ac4bd98d2751242200d3fff883124e35a7840b913f2397df"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x0, 0x4, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}}, 0x1) 08:54:13 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x80) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000100)=0x7) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:13 executing program 0: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[], [], 0x7a}) 08:54:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:13 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7400}}]}) 08:54:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:13 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e6657195af06c356db85f15f05bc5c130"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000140)=ANY=[@ANYBLOB="00d2b1161ca88515b52d6fba7321a026aa4c7e419c1ef2a62e9fc6ac11fba68f5647ea70f67e5203fdbc929e92d1dc21759795770d3db60a221afe8edfba0ac6"]) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x0, 0x0}) ptrace$getsig(0x4202, r0, 0xcf, &(0x7f00000001c0)) 08:54:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:13 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2e2f66e202d874911c8d4decccc8264f0c6fd771dd386d36371e918f6e9730888658b253f42735b790e7e29036982db0b0404ac64f8e99d1114f1b59fb2280d31a0e77626c14ab000000"], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_DEL(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x5c, 0x3, 0x7, 0x102, 0x0, 0x0, {0x3, 0x0, 0x1}, [@NFACCT_FILTER={0x14, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xfffffff9}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9cf}]}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x80000001}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FILTER={0x1c, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x6}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x2}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7f}]}]}, 0x5c}}, 0x884) 08:54:13 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x80) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000100)=0x7) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:13 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x244c2, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="2e2f66696c65302431126b5cd6e7c96b96428317e38738994f777a39b0c02747c235fc49a11bba4bc130d69d7bb9aab665135d86dac08b4825f153334645d163eb922af70537936053ffd076c97977b6156f7d0892ca021f7ef066f853464900b57a924f4504e2f95310d134143e1d5adf911c00"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:13 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7506}}]}) 08:54:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:13 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r3, r1, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r0, r3) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r7, r5, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r4, r7) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) getsockname$packet(r11, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r12}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r12, r9}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000500)={[{@noquota='noquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'self/'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@appraise='appraise'}, {@euid_lt={'euid<', r0}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/selinux/enforce\x00'}}, {@obj_type={'obj_type', 0x3d, '/selinux/enforce\x00'}}, {@subj_role={'subj_role', 0x3d, 'noquota'}}, {@euid_gt={'euid>', r4}}, {@fowner_eq={'fowner', 0x3d, r9}}]}) 08:54:13 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000100)="f49527cd2a402d2be3051959d109471d875c55a2397604cec8e20f78247adf0811677486aba4782bde148f05206a5ce5916a07b7aa6dca651941c8464e41b5dcaa1831ab8adb00238c63697b9288304d3c12e788cc5bdc8a6bb095b5dc19b171e1f5294545cdba47232d2a3a091b5d00d43c2bbb", 0x74}, {&(0x7f00000001c0)="7428c90c43f8d8f1a13e5b7d845b511dfcd2958092b930f00405d222dcb5bcd83c835338e92f7036e1967562c68cfeba9b4e693a61050efa5740dbba3a378be79cf98a06c8ece759f030a6eba16e5c7751146919307b7a3e4770d6395084545545adf36281564692683004dc4e7c4f3ee09e78e3a7d0958239", 0x79}, {&(0x7f0000000240)="1d2010645d12ac8b6d79f58f959c02e107677e85259469b410fdfa5e2341c070c580c3f73201c89d4fb199c56ae60c7876a45068edca4472329e02c15f44b6d1ead847a81bb8934adfeb3f02ee8ef9b290828e5e64a33dc44762671f58c221a8873dd7914c96c8bc79f326c8491cf49d3d4e4e8e06f6dd2a8a24f1d8a16bf73be7f50725c252f0d4d2da2eaf84dc5e369caa04f11960df4797f18dd5d49302e360154459291307d9e6484b47528f8e03e2c1d5defc6e95bf95c0163aa177d9f87aaa143653eac5e37412c635411975d704db52", 0xd3}, {&(0x7f0000000340)="2a60a343a59110554404717b2ee7bf7705bd4c77c14ca13203013156bbe7b598acc3d94bcfbe497ea081e5e047515d5e8ededbfa17de82ee3852236325f25eb1237dbf81b712e9742d1ee1063225a103880af549c581ccfef0d94d5ec8c6", 0x5e}, {&(0x7f00000003c0)="6703ea109c7315a003ab18775982ef5aa7652eb01e765c878d9f2aee750922efa84c8fb8d232741fe6507b72d8b51dd0378302bedb14eeeaeed2c86b037552af218d833a444fa57297d7b3521d57e805554e0404f9ea09e07de78b6d3303d7e1f6f53c361341efe415e10974690a5a292596d9a66a7fecc5ad6e3c1667e58d7d836b6e799984647616cf3d9d5f4aad034a9baf71871b", 0x96}], 0x5}, 0x8329b81ebe1332b8) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) renameat2(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', r3, &(0x7f0000000640)='./file0\x00', 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3a10c38, &(0x7f0000000000)=ANY=[@ANYRESHEX]) 08:54:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:13 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) 08:54:13 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x80) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000100)=0x7) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:14 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getpeername(r0, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x80) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:14 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7a00}}]}) 08:54:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:14 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r4, r2, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r1, r4) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x38028b8, &(0x7f0000000300)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}], [{@fsname={'fsname'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@fsname={'fsname'}}, {@uid_gt={'uid>', r0}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@subj_role={'subj_role'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@uid_lt={'uid<', r1}}]}) 08:54:14 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB="d9"]) fstatfs(r0, &(0x7f00000001c0)=""/213) 08:54:14 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x80) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000100)=0x7) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:14 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2ec38db5a2aa5465"], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x1, 0x0, 0x0, 0x18f04fe, &(0x7f00000000c0)={[{@noquota='noquota'}]}) 08:54:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:14 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="f75066696c6530e6b3fa50a2da145b245d847351ff75d7591b3122b9992678876e4ea097cbd2eae7f6553c7b81d00a37a39c08dd1356804dd015c2d74eae01279e9da9dd5343d96816f69958f31a8d9ecd11cbac78dbb00faf8245362d74389b0a92fbfd502d4748cf76d5759bb323463146f760e9282076d3dfa01fd697ae55551cc5553597a27b7bd64149ad3caff2169c4e001c0d92e22f8d57bac9e5f64d9c21e0f4236a91d7d46cd8"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) r0 = socket(0x1f, 0x1, 0x7f) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) 08:54:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 342.649943][T29899] SELinux: duplicate or incompatible mount options 08:54:14 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc02b}}]}) 08:54:14 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='.?f\x00\x00\x00\x00'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) statx(r1, &(0x7f0000000040)='./file0\x00', 0x800, 0x1, &(0x7f00000001c0)) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000140)='gtp\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000000480)={0x0, @broadcast, @multicast2}, &(0x7f00000004c0)=0xc) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, r2, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_O_TEI={0x8, 0x9, 0x1}, @GTPA_VERSION={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @broadcast}, @GTPA_LINK={0x8, 0x1, r4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x24000000}, 0x24000081) 08:54:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:14 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x80) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:15 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x1c, 0x800) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000200)={'veth0_vlan\x00', 0x9}) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000040)=0x401) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="a57a2c2cad07aeaedfc38cf07d933aac692861b19290"], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x10f94e4, &(0x7f0000000100)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@subj_user={'subj_user', 0x3d, 'minixdf'}}, {@fsname={'fsname', 0x3d, 'noacl'}}]}) 08:54:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:15 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) sendmsg$inet(r0, &(0x7f0000001300)={&(0x7f0000000040)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000001400)=[{&(0x7f00000001c0)="3fcf9f6de1decb019d6eeab5ae1222d74882ad99dee0ac462fecdc649ee2cad597012956c524d718626380a23b800862d7d6d4f647545a13d7bdce88e34f5942270ae3356241867409b91403a6b1846290f2e8753e921d0a16ebfe6be896f1542688bbc81a3843e24559b770fb0f5fe3b166e9fc133690ff53e195ed489c5c38b0c98737654cc90c8238e3d009cea043ad0b68f3f4e30dd6d6b9e338e2c8b1a35be4da8b86ec1512da35c17dd5da30c8558ec7fa949b5572d332e7142e16b2c344d403ec2dbad4e99fa4b6e81d3d63d16b178b83f52092fcca2df7195f9b7cb53d45be396b486c3be3493d5c84c0fc514c28f0dad0cd1c317d1ca7f31a2d9b82ab47e46268266989319e4cf6ac01821140272f719eebd18c1e464c45d43029838edd260481d48c3813f786c70d409a7f84bd2c0c1c5ecd3329912db1b35b881e71e1ac23db47ca356163ba047d272bd9fbf6c327363b05b438a676fb6c2d46419f615ab1965f94ba3cc1ecd489981f9ef6776e44935d475ce5d362a4c895a6af22cd60dff2ec00bb0a6be27f4354e0e0067a33979f41c9de3750945308d01d40b0907276c53ddec3d97204024c19149e618c80666ddf67dc342b0d46cf6f7d1103b0656720f7ad85f7f1a88159be51123f0734260f24edc4cfd5fbd6c0cceca0e9028672c9909d1badfde037cb8715983336f71b8fc856b1695a816eb57625f160a3c867cb5bb80de32d9dbc7a5a06d62989888e94df915c0a7d454b928bfe2ff7c5137bfa9bb333614563be0e893a3d5d57e2add2fb0b6fedb0f99017e8084ae7da53aa6f282208cc8c368f214d260f78f9654d2f002a8b1858290276f00e6aa99b63a405013ca323225c250d8e048ec34cfa389242a6c4a718258ab6536db7a01fce33696b75a9bf66769d24d1f87e86f6c4a8344cffd879d9f4c6cf9c9608eae9b096d926b6d2974b543a058d33ad329906b108e347f5aed7deec993e6e3b271d549a9fb1c1ac35ec9c08562f532e78edac789db0f701668cdef01eb6f702dcc73f9a73d8306ffcb2a505a4611099ac52f67a56d66674d49036c2ff7c2a707c0ec27d07a4db31e62ad75748e53f7b7f289e5c0321ce8c40cb42ccd22d1e4bab2d75b54968c93001c1656388f55c69478349089b8d977d61585fc35a8a3f78821b914ef63e37eeb82a0d7e5114395573d8b424788c5a9f25747f51bdbdd0d1575d5ccd74998a5b29644ed604f9014f92d90c0190d68d5be96f6730553712936cea507c0c1e7bbabc2ee033cb51d3f174cc2cea91369f9e3bed172af9adef6960321a9feffe82613c33de71edfb7692fead10e6d1dedaee790e47c0674cced20f8d4b9d119d9d83b79aab6785b8dc64b29561e8f8e70da77f9790649efdde76fbd8cd9e659e6c026c480c2244ff97fd7c105fdedb3cb668c09106add6c2a1c02a1fc8bcb735993fe7d99382dc141b8cfdfc75305d6e800f5cf471a7c7c5f7422be48fbe54b0a6c57ee84d9c8b233f5d52df5484d9362d9805fd97262f7496456ccdf6129939a8457b41902a4a6f2273af793720164cefa0483a98c2f5770599f83b3f8080319a3dcdc330faabc393fa5bdfecf0ad06f594d96fafe0610229f914a554079d440aefa14d2e76ba90756feb4f982277178e686ab6bef81bd39bbacbc8779b13b43e6b2a727d39771fbc6862c58049a01a8a9ab966365562fc661f2d615215e70d81fd11d533554f6cda921f09c5dde0b862449cdc2562baf2707d8381c8cb536d90cd0ef634b435967b656cbf8001eb6576e5dc600fdcbfdb0781e72ca63804910f4eb314cc0b3b0970d45a31d1d19ffe2a4816c5c62cc14b4f43a9519714e11e1bb6fbf8fdc7d61bf37030d75d2c6f4cb20c525dd96c5282251c259179c75d0aa6294bab023c873f0e439862474ce8ffad7dd6b10490a774df9f8171f73ec5f27ed6ca2091e0a834f284c2979742a24ebeda090f8f0227ca0e3e27d09535597737f7553ed238d6bd6c707c5eaef09435c16b4700108800f908f78b7d9d8e61ae0647937834100c54280e9280ecf0286d5364dfa9c33af647f014c5be92f5e32a75b3ff083c3a4e634bf8f93963e3ec75686b6d7906898c6100467d6f86d2fb5b721e727c0ff0b38de4e449af6c5a01f20cccba26202d612500db98865f70006dc6b219bbd2fcd7356d052ff7127717df80885cfbd534570adc7f61a5cee26e3d82e1e2c22c4be59eaf02d80b3a8ffbeec69b4d8b5d9bc4b591ee48fd75c3cadb4f1e555e7f1e6be980a22c84705404147266bb5159d8fe29003962601fff82823f94566934e1a4c300dd9cf6a154ad4601dbcb3cc759a5a0771d695156ecf348143cc356ab1a266728611d7b556e6b860f3df4ed6501ad6c03d83e7370472a3c7a3dacd82b5af8236cb771c29eb4db514f4f812b3a2a8711ee214ad2006c22c2ab21270fa46ffe8a414cf3b2af40fbd9be4e23afe99d3d775d609e4d410027f66409b89befc01a01d1ec951592fdea89c3ddd531742bc44f48afadc14b7f0e405e363f3760974c1e8d62a019d0ff8a8a0880194f1034f93d559b67820dfa8498dd915e905024a1329cfb892683ae9ad1821ebe0824e73e551b3383a1d68efd8cbbd59182409332401afdaec9fe612841c12b7e643b3ffa726b67ced2bd75e61362267b885d94e26efd5a6a3331bffdacca565a1c96f52cf406aa2e330b8273c8fcfcd3c8039d749910a7f4c77ec538a555669a9cc2fe9d4c834df29643b27911b05be8f629ed40bcaf9b3b86bf5947d7b950efb168d3cfd8c2ee29690163a65a271a6f130ce35e7996b0b9e114a3bbe09db431b712cb390dc8691c88e709b732d0148df6e8c05ba9e8dabe4d3ed535e961ac0ac923f0ba22f95c6933a4f3acf0d056550a41807fed5ddb309ab274ec62a43ee0027256df3d325321330eb42a003e0889558a5e9845364ed5cb65f970ed044a0b6419dd85a2791a6a0ff97e090df0f49acef9d774223a65e3effcd781095976fbb1b0a1b8321bb2840e3afeceeff4dae65061137467789a5fe149d454669cbf2250bcb59fbeee5e003815a0fc808ead1886687c94dcf6dfb669c307713a6449883164c852058858a56a8a48a088c3abc519bb2ee81deeafd162eb47c7ec786cac41cf281640f511fc5a8541db866c10ba24920d96d0b55ee5cbbeaea9a735f256376cb283d596ff010fce08eccf1d600addd23933616ee6e571f75390c76fc402f2f7952c5f81264d2f956812b0260e8536231c1426da6b1f08e78044fb3f52829034c9916d0fa7ad3107d4379784cc4e857270e020892605d1740a8de94e61b773f2c7d6f5a5d59c16cb8df0d4f7bde5fa2533df568e0e30fc0de308cdebc5260ff9be26bcd2e8272f6e0a17df4098ad5b48fcc04695bccb550dc589d7700d2af7845b50ca03df1d6cdbce6d32f8fa4f73745de73cb9788583e7b0717e9e4db63c6da6d1af0f7a818cf7c1942d0ff5ccc8c497086d023622a4cbb28a62b342100058b5a15384bd828ed8d15b2a12f3f409d6b197149b60452d1a83eea6dcc72c5119be019c7ae492f04e3277a5a408bb59d5e14b937c8bc77fd407ad4135b7fdcddb6f85b6af617d28247065402257ba2ce03852dcfabdad0c88dc40cc0115c0ed09f2f4d61504d5216c8dda6c16af668e739242281ec889c2d4c2b4d44cb5846050ac7da98aa6aeedda2b3c5dfddc579f334d70becf6422dbec01765181028609ebdf56d9b3f842d4f0bad4d82340cf688f78ab84980282d9a45b6dbc1d219b20b2273af399b7f0da0937c5c7dffa62b4561ca08719d8aa83664bbb717c035f6850f900605624877e02f0be6273391baf14e2c80c14f36a7d6478cbeda30ba67c6a7cca231f87445da29aa27e3c9a927213cd1d19eee39ecb632c38f8e93444b0be757085739b995bce16037d54f54d95cdad9af87c304d56f8bf6ddbef2c3a1f2127e6d3ec22f651c8758f71edfbd1b8fbc48c746681c46970eb5cddadcf998a54f67947eef717324e6463addcbb3952fb9fc2a935facf94cf15350f5f6ce6d341f667d9281fd758cac091d23456935699830eec906f18a6406af3ac2100cf4f3560acf2e51c93b843feb19c600638a925ff063145d300295535b6132ba6d0033121e6ba2c453389addbf3f2896ca60d909348c4199f8864e496201329966d557c2c12465db6ef76105620b32e62fe849c30508e6f862195620abea9279949156e3b9f9af43b23d9887c580b855166ef792bc25fe0ebdc52222c71128c679117cd649820f90c507a99d05f31f239a7b80ea6b129fef81f800c4095a2ca0a32bb3b9f5daa72fdbd44178cec7dd0bbf5feb62995e80a0ec6c20453d743b3fdfc2a6e9c181131e8109c3bcc156fd1a1d96f3cec0a14a8332532b53d0b4074090d5310fc3c3d8dc8eb1dc747bbda181ac5bcb48c89e465ef9fac5f7702c78932236ec51f3abd4e0e973c17a5ab1603dc2caf87873ca7af92291c9583cab2b220f4419c1ad51b351af46cb72fa1ccc39135449574490483b607074b62af3fa70dccf7ba0e3dd26ac88c629020f31ef08036a1a3ecebe1aa8091db7886a8a1b5b46be964f2090387b15b114f36e3e1eaf601d88d19c0379d7614c734f638762d21711817b41e5c17d1c5e68ae7f3500cee1ce8346decb2f9a48fb7c55541db3552a2f8b20e07074d85772171caa208dce6ba469d03ab729edd7b21bde279908877385f7b814db4704f6c695ca6d114de467010f78bb507f5d0b373c973c4ffa4165197e4ac727eb0418ff349b8ba5f36c19eda01abf5b96edb1ee3dd3423ab06523ae7e49a6075065b406821efe9efc25aea1f335293a13e12770828748358e59c6681a601cf2b9fc7c57780f930a76eec73efe05fc30b1505afc482ed3f0038aa65763afd4d71245a0ed2c8dd34e4963a63667bc8fbcd42836fcdcd83cc151fbfd06b0150ded1fd3e38d5d92a2309a8ed5e91e96a234fd687dbb146054a0e88bbfa33fa74d4ec7dd0ffc2a228e8c1e2d42f02ab607838fb9f35a97cabfb1ce77a44981446b44969e81a9f0de608703d34d73e29039d768e6e1bd92b2f74c9a225fb28823d9e9fadc1b6039e15eeffe1ee67b18b3ee12ea04ca18e95ceb95d7b705d3d7490acaf13454a4d4328a5b7384ccf603e95d57076d0c19b33de5b856a687dd9795f5668b62b20366fcab1f467fc51f11179836a84cc1d45bbf9329cedbf8458bc4b63c5894eafb2d43ee354f9be0ca26db116775ec4f97ab58c3aa4b17b4084ec1d9d51d40023760b3ec7581afe661903c3e2b261c4076d4acaa4bd16b9a92985b68549dcd9c08672799ad0f14b6e57f23ef88d64275acd58a4ddd52a9c2ffbabbf865969cbf493e0e7d10da0bdff90a7447857a385d84b24526790ceaecbe911e933e3018802c6c970caeb9d1d1be78400275ec9fac39326b587be25a91d3b3032062428ea806b0f0e115ec0a4fe894242743b16c289eafad68b1c2153077e65a99af8ff65322c76891fc54c975891ab6143a553a2fc10a38504da09da45816f459d23f6eef13266d5e7376b25af1bdd25d1f445324ddd19e95b396ba05ccc725f2ef3baf0367aeb8d0e10e25dcf7ce4715258963dc27826983d886b4b56f04fdf2fc6b8edb7423370eb70665056412fe1d60b2cf3e401aa2eeaceaa55e54ab46439e90ea12d285d33b9671801d9dd7b1957c45c53e1e8faf6d17f6d57cd1459c1699754299fdbc6894c4bc19d8b105b6fca9b5f198f778020e80ab80534398ef5b69db2b1", 0x1000}, {&(0x7f0000000100)="5937fdcb321447b20cb675667055d04a9685e9aa6d891c3863d1259d01cf9dbd49bf30ac833b07a6", 0x28}, {&(0x7f00000011c0)="ac049bc6705a1d991abad7f8fd162ff10b16852c12e2986df05055b3dfdee29697350eafd871a5063f912f6cd85faaac8d6d420af6acf5420ee1196e850cbc2c9211c71d62da9f8a5c674e31587bc57fb6fb36ebf208e93d28d351e70a538dce405c7fcb49a4eb8a80409b440d9021669ee08b05a0cb4f76d53aac9485254fa5977a89eb208ef556d8e429cfa085498d364c2954cb5c2352cafb46f7c437cfbeb62ce6e8228fd0a7269c5a9528dfdfe0130b06b626de4bcb3e79fa3ac56f39c75b4ea35467002efdc70121772df8c09e9c828f9bb6487802081f1f38fd", 0xdd}, {&(0x7f0000000140)="61b91fa16bcd164eb7755b9afd3855924e26f7c849e467", 0x17}, {&(0x7f00000012c0)="c57b5b30f0354df7cf28419a1ee9ccdb7fe7c62caeeba9a197", 0x19}, {&(0x7f0000001380)="67bd57194b7f3d766ed276e462aa7e7a72671cbc3a669c12c1e41e9afbd820a25d43245b78b46d00be74a6510068c07e6a1aeb2c1d4aa18c31e516127cd72c73395f", 0x42}], 0x6}, 0x40040) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:15 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:15 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x1d440}}]}) 08:54:15 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpgid(r0) get_robust_list(r1, &(0x7f0000000140)=&(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)}, &(0x7f00000001c0)=0x18) open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="2e2f66696c6530401d8255877652978230534504ab0226f37b87f4a6f02ac5e57f42e22ab6dbd8db1cf16b105d810702b753804ac1db8b71949c22a3ff7fdcd2fafdb12b3d1ab42dee8db3688d87269fbdfa"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x39828b8, &(0x7f0000000040)={[], [{@subj_role={'subj_role', 0x3d, '-,'}}]}) 08:54:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:15 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x1}, 0x1c}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000240)={0x0, @adiantum}) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x4, 0x70bd2d, 0x25dfdbfd, {{}, {}, {0x14, 0x18, {0x5b7, @bearer=@udp='udp:syz1\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x800) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:15 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x3c, 0x0, &(0x7f0000000040)=[@request_death={0x400c630e, 0x1}, @acquire_done={0x40106309, 0x2}, @register_looper, @request_death={0x400c630e, 0x3}, @enter_looper], 0x86, 0x0, &(0x7f00000001c0)="de7c8e7ccefe8646a0b580373751defdd957cd11cec920ff5d2af655d5094b5059f24676b24af3d9d15d97ca35e9d1bee4402c6249c84c8f78d2d688d03606da8c211e4b0834c55b8ec8b670530b58d1d8b038052474ea16410be8c8907ea8befcc47ce5413c0865ce51243570de0dea5a50b590f50792fa3c60fc62aba83778ec41e4e02712"}) 08:54:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:15 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000c8020000580118000000000058010000000000000000004c300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0005801000000000000000000000000000000000000000048006c696d69740000000000000000000000000000000000000000000000000000000025004a00000000000000000000000000000000000000000000000000000000000000000000380074696d65000000000010000000000000000000000000010000000000000000000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000020000000000000000000000007070747000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000000000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000004feffffff000000006a1c1776b8cec9fcfb208ffe94f1313acdb240a486b08a4ac9dd6fa0f5a050816ac8ba5e2daceab3910c9fa575d8ab0292f767314acd81674f852e1ab33ade1fda4a5069ecdb77c511ed2f793f7d3e4e60ee0dc11b0c4270ffe83e2b512898ecce8dd99b4512fd8a7014a8f6f8e4efd444a88cd2a7ca5601ee12cf7e07a03a59f7221a743f52b0256400c7a12e1092db69b0dfd4adf96c3eb1dbcf0a3e52a8318b83b98e1ddf6b90f0fea1693b1af97a53bb2a5ab491727ebb408306cdd6c063a2e4883bbbdcc7e9638406028e199de8252067bcc1dc71d45350e261920ca95f2565b978e34358e8eed2fa40f3fbe2a7dcf63857"], 0x328) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) mount(&(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYRESHEX=r1, @ANYPTR64, @ANYRES64=r2, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES64=0x0, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT, @ANYRES32=r0, @ANYBLOB, @ANYRES16, @ANYRES32=0x0], @ANYRESOCT], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESHEX=r3, @ANYPTR, @ANYRESHEX, @ANYRESDEC=r4, @ANYRES32=r2, @ANYBLOB="001e544681f0c6bf940b353fa2cf9aba0a2ca2aea7cb"], @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="b8916956db648d4b9477640daaae596e5f70e3633f193efa4cb21112864ffd51a3e8d01272", @ANYBLOB="1f33e5e0c339ac552e73ab1c4641455329237498c4b8091e635c5b74d591c87d259c58e3acfa8fcc76099345e68180c8ff5b8df010ae54af1ab7a5ca8d661968a0377b516ad9e63c5075df6e7bb8e7344f1cf0b2c60d291ae901e239c6df0023668b2bb640b229b4fbfb45ba0d211e9f525801c318952a135c31dad8a63c366565cdeebc611fbdf541a74e64c3ecd5edca4f8ea424d957cf0167e7962879087810e0cc0d2b7a159ebdcb2dbfa6063c2de568e352a683c17e4cdd5d7897facc99b9025de72dc5a5fa6ea2ea9b31abc974286d1370a6c04592a1"]], &(0x7f0000000740)='./file0/file0\x00', 0x0, 0x20c5000, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x39028b8, &(0x7f0000000000)) 08:54:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:15 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r5}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r5, r2}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r9, r7, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r6, r9) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r12 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r13, r11, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r10, r13) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r16 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r17, r15, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r14, r17) getgroups(0x4, &(0x7f00000006c0)=[r17, 0xffffffffffffffff, 0xee01, 0xee00]) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000007c0), &(0x7f0000000800), &(0x7f0000000840)=0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='system.posix_acl_default\x00', &(0x7f0000000880)={{}, {0x1, 0x1}, [{0x2, 0x3, r0}, {0x2, 0x5, r2}], {0x4, 0x2}, [{0x8, 0x4, r9}, {0x8, 0x0, r13}, {0x8, 0x4, 0xffffffffffffffff}, {0x8, 0x5, r18}, {0x8, 0x1, r19}, {0x8, 0x7, r20}], {0x10, 0x6}}, 0x64, 0x2) r21 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r21, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) ioctl$FS_IOC_GETFSLABEL(r21, 0x81009431, &(0x7f0000000180)) mount(&(0x7f0000000900)=ANY=[@ANYBLOB="2e2f666900003000afdcc27f5f6d266f93ca7c04d92f2eee6ea2c7b100bd37d1bf236278b7799658dd590efc60ca65dda29089064dc89f0ab23532398eeadcbb94cd5140fa6226a5451a0000000000000000000000001b73596bb536074b93643dbc314cdc9f515e1d45bcef5a8d6f16bfe3a6e266858b2308001cea7ba1e77715223706d60ff2c47f1be25dadd8b246f953198ba0d8a72ddafdaa1fc7e945636652e92051ae20ce1043345f8765033477324f294370ca414caffa4917158bf0652dbd20df2775945656cd4b7627368b07ea2d698d43e79b8daf542322d37445d2f9e24000024d3387ebe4f3a5ae9ba28e7b35f98cc14d0d225a81c8a19267b3db3c446cb3a917cc081c518c9c445cb336841d66"], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:15 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:15 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x20000}}]}) 08:54:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:15 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) getsockname$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r7}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r7, r4}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) connect$packet(r2, &(0x7f0000000040)={0x11, 0x1, r7, 0x1, 0x0, 0x6, @random="100707410897"}, 0x14) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000100)=ANY=[@ANYBLOB="6175746f6c816f633d307830303030f399902da9303030303030383030"]) 08:54:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f00000000c0)) ioctl$SIOCGETLINKNAME(r1, 0x89e0, &(0x7f0000000180)={0x3, 0x1}) creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:15 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000080)) open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3803888, &(0x7f0000000200)={[{@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x1000000}}, {@journal_async_commit='journal_async_commit'}, {@journal_dev={'journal_dev', 0x3d, 0x8}}, {@nodiscard='nodiscard'}, {@barrier_val={'barrier'}}, {@nodelalloc='nodelalloc'}, {@delalloc='delalloc'}]}) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) 08:54:15 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:16 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:16 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x40000}}]}) 08:54:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:16 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) umount2(&(0x7f00000000c0)='./file1\x00', 0x0) [ 344.414832][T30129] EXT4-fs: 53 callbacks suppressed [ 344.414841][T30129] EXT4-fs (sda1): Unrecognized mount option "autoloc=0x0000ó™-©000000800" or missing value 08:54:16 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB="2e1f00696c6530"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:16 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'ipvlan1\x00', &(0x7f00000001c0)=@ethtool_perm_addr={0x20, 0xcd, "2490ec20054c355d4034eaeb4400eb08b93c491c1cd993cfa83f264bd2fa6f5d97546c4920aeccea4eb944362d3406ce0809b5db73781f9c5bdfd741a81671d01d6465887c3b573d23c45e11dc8c7e126fe5aa149f3606798c09317a5a8d0f47fbeffb06a82637c4c0a0d07fe99f94faf659cad4a29c32c6eae2dd3227f09d529a4fdc9dee8d2db60eb0a30e56b8f873b1709e4c3fc802b12f8255a05eb580e3525b717f739e3a6b988faf3ae300196c1ae14c13a0ebbe30ae4b213689f0d4da859763573f4b35ca5dceddc442"}}) 08:54:16 executing program 0: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 344.598308][T30149] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 344.615974][T30143] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000040000, 08:54:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 344.752595][T30158] EXT4-fs (sda1): re-mounted. Opts: [ 344.761758][T30159] EXT4-fs (sda1): re-mounted. Opts: noquota, 08:54:16 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x80000}}]}) 08:54:16 executing program 0: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:16 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='*']) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x52005) r1 = request_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='eth0\x00', r0) keyctl$search(0xa, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)={'syz', 0x3}, 0xfffffffffffffff8) 08:54:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:16 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f00000000c0)=ANY=[@ANYBLOB="42bfd25df878a1a9db482f56332cdde3069ae771b41da73b68c2ba34f605a18e23d6"]) 08:54:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 344.950253][T30189] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000080000, 08:54:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:16 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r4, 0xab9535e9a6578fc1, 0x0, 0x0, {}, [@NL80211_ATTR_WDEV={0x8}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x22f42f220a96d8c9}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x64, r4, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x20}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x4}, @NL80211_STA_WME_MAX_SP={0x24, 0x2, "6029a89f7dffbf0be148918eab7a1e868d9cf8d122ee685df61fb6e0ccaa7f12"}, @NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0x3}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xd8, 0x3}}]}, 0x64}, 0x1, 0x0, 0x0, 0x8000000}, 0x10) open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) [ 345.034309][T30205] EXT4-fs (sda1): Unrecognized mount option "B¿Ò]øx¡©ÛH/V3" or missing value [ 345.069794][T30208] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000000080000, 08:54:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:17 executing program 0: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) [ 345.092421][T30201] EXT4-fs (sda1): Unrecognized mount option "keyring" or missing value 08:54:17 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x80040}}]}) [ 345.135975][T30231] netlink: 'syz-executor.2': attribute type 153 has an invalid length. 08:54:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 345.294620][T30238] limit_mt_check: 57 callbacks suppressed [ 345.294624][T30238] xt_limit: Overflow, try lower: 620756992/18944 08:54:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 345.344221][T30236] EXT4-fs (sda1): Unrecognized mount option "B¿Ò]øx¡©ÛH/V3" or missing value [ 345.362622][T30247] xt_limit: Overflow, try lower: 620756992/18944 08:54:17 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000040)='syz0\x00') mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) [ 345.410135][T30251] netlink: 'syz-executor.2': attribute type 153 has an invalid length. [ 345.416654][T30257] xt_limit: Overflow, try lower: 620756992/18944 08:54:17 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) getcwd(&(0x7f00000001c0)=""/4096, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000040)) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) 08:54:17 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@initdev}}, &(0x7f00000000c0)=0xe8) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f94f6, &(0x7f0000000280)={[{@noquota='noquota'}], [{@audit='audit'}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@euid_gt={'euid>', r0}}, {@smackfstransmute={'smackfstransmute', 0x3d, '('}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 08:54:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 345.571149][T30270] xt_limit: Overflow, try lower: 620756992/18944 08:54:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:17 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3ff7f8}}]}) 08:54:17 executing program 0: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) [ 345.728862][T30279] xt_limit: Overflow, try lower: 620756992/18944 08:54:17 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x30002, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 345.804689][T30292] xt_limit: Overflow, try lower: 620756992/18944 08:54:17 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 345.865345][T30310] xt_limit: Overflow, try lower: 620756992/18944 08:54:17 executing program 0: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:17 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0xfffa, 0xfff7, 0x91b0, 0x4}) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) 08:54:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 346.025616][T30321] xt_limit: Overflow, try lower: 620756992/18944 08:54:18 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0/file0\x00', 0xff, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2}}]}) 08:54:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 346.145162][T30337] xt_limit: Overflow, try lower: 620756992/18944 [ 346.173554][T30341] xt_limit: Overflow, try lower: 620756992/18944 08:54:18 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3ff800}}]}) 08:54:18 executing program 0: creat(0x0, 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:18 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, &(0x7f00000000c0)={0x2f}) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='numa_maps\x00') ioctl$FIBMAP(r0, 0x1, &(0x7f00000001c0)=0x401) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004) 08:54:18 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x88, r1, 0x4, 0x70bd2a, 0x25dfdbfc, {}, [@NL80211_ATTR_REG_RULES={0x2c, 0x22, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x81}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x3}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x81}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x8}]}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x2}, @NL80211_ATTR_REG_RULES={0x24, 0x22, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x8}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x1}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x2}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x5}]}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x4044041}, 0x40) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00') ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wireguard0\x00', 0x0}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000380)={'batadv0\x00', 0x0}) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) getsockname$packet(r9, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r10}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r10, r7}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) r11 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) getsockname$packet(r14, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r15}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r15, r12}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0xa0, r2, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@ETHTOOL_A_LINKSTATE_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKSTATE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r15}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000}, 0x20044080) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) 08:54:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:18 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:18 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x400000}}]}) 08:54:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:18 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) 08:54:18 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0xb0, 0x0, 0x8, "e25912cd4e47c32e60b3ee783f02061e", "3b23f0f0224c39851a35dd828d7472b0cdbb38fb1053ab94f630b8e2b30cca3d8eb319d8f680a7a483cba56517afac0b4ef1347eb68868582bd9fb62c6b574e7c8bcd079cbb625776e283d275ffa53641aaa9d565fd93d6390b7e33fa976f5d65ef21e34e00ba5b1d8f16f0adbcd0ba1625d55d72d3a176373f8abc4bf188ae98429f6f123e39443ef75ac267fafed1bb7f050c1c49111570034b2"}, 0xb0, 0x3) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) 08:54:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000380)=""/162) creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1011004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x4e, 0x3, 0x5, "1a400c1c44a51ea1b57e85c27a945597", "0881fbf36406012ff527c7524e8495e560c35748a25ecd0ad2f8f284d1c1c345311f1880788f7850ec71cd45119414f7c06f6c3c94e5bb0f67"}, 0x4e, 0x7) 08:54:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:18 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:18 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xf83f00}}]}) 08:54:18 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fchmodat(r0, &(0x7f0000000600)='./file0\x00', 0x2) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000c8020000580100000000000058010000000000000000004c3002010030020000300200003002000c3002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0005801000000000000000000000000000000000000000048006c696d69740000000000000000000000000000000000000000000000000000080000004a00000000000000000000000000000000000000000000000000000000000000000000380074696d65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000020000000000000000000000007070747000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000000000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000"], 0x328) sendmsg$sock(r1, &(0x7f0000000400)={&(0x7f0000000100)=@in6={0xa, 0x4e24, 0x7fffffff, @dev={0xfe, 0x80, [], 0x34}, 0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)="3a11f72a5208cad947a84f8e64eab4dcfc3fd2bdcc6586b81ce3033cbaba91c607469dfb01e5c33d4e4bd50a5e266f738bb3d058b97bd239af899b722ab8e408599264b44662337e2604305fb52e47218e574af520744c8ea38e0a58c3c238e4a2c47290deb34446ba416efe6efd68dd27445b62b21aa9c6a3da4bb539103ad6db6154cffdc25e34b6c5e23bbaedff5da62a6adc05118becb428652ff9513fe39cf4e7fede5a2f", 0xa7}, {&(0x7f0000000280)="a2d786af9f1bbb7f5cbfe3d2ba68e143bf5d88cf47eb1b24b50c5d4eac5a6435c8af28438943b87c435c129ab1924c62fa1d984b337179409e1e48048455e3b4507bacb62ae96f35fe1e641c12118e77e990d305a884fc476d421ac587bcee83447913ca48d93d6b901c23a73087452e17da69c013bce0c73c4059f5ad3ca8b675bc271e3819edff37b310f2e7666895652f5d90352b99f1b0f79df653541a3634b88a824149ab3e7a5453581e1c39fd3b8e6e5a7c303c83243f9f0bfa05f7c92e629b7c1954a2eca0c60671c75e1174ab72bc4c7740c7cb28f44c957cde0dad19dcc463b444127708e103b2379d6012018b3ec610", 0xf5}, {&(0x7f0000000040)="3899377b24be852757f031e8a846e2c5c45765acb3838380dd5adb9b4f309c2d16e09e5d1df79d8b0af2c391bd9e2652b694cda023b2c8c6586620eea8", 0x3d}], 0x3, &(0x7f00000003c0)=[@mark={{0x14, 0x1, 0x24, 0x304a}}], 0x18}, 0x840) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000680)='batadv\x00') sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x1c, r4, 0x310, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3ff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4000090) 08:54:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 347.062891][T30474] xt_CT: You must specify a L4 protocol and not use inversions on it 08:54:19 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x60cc2, 0x40) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="2e2f2669419f60e60021c45a68b7331d39138a6520"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000240)=ANY=[@ANYBLOB="6175746fdf64615f6b63f002e5bdd5ff23616c6c6f23bd45783030300030301063302c01f11e400e1ed7e7b1cc642229e276b1f9f668fca2474297014ad58ce332ca6302d88e7c1531c80793e1edaa2cc39812ca5911ecae876e590900528c74d2b663760936300003629365876ba7aed61e5c316d775aae133387f93d48144c27382bd7adef16f7912244b756eb9af6e813791c67da606458dfb72d313e16b8e771829581e20bcdbb55090000000000"]) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/ip6_mr_cache\x00') setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000340)=0x80000001, 0x8) readlinkat(r2, &(0x7f0000000100)='./file0\x00', &(0x7f0000000380)=""/120, 0x78) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000480)='wireguard\x00') stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r9, r7, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r6, r9) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r12 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r13, r11, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r10, r13) setgroups(0x5, &(0x7f0000000ec0)=[0x0, r0, r0, r9, r13]) recvmmsg(0xffffffffffffffff, &(0x7f0000000640)=[{{&(0x7f00000004c0)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000540)=""/143, 0x8f}], 0x1}, 0xee85}], 0x1, 0x2100, &(0x7f0000000680)={0x0, 0x1c9c380}) r15 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r17) r18 = openat$full(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/full\x00', 0x20782, 0x0) getsockname$packet(r18, &(0x7f0000000f80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000f40)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r19}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r19, r16}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f0000000e80)={&(0x7f0000000200), 0xc, &(0x7f0000000e40)={&(0x7f00000006c0)={0x768, r5, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@WGDEVICE_A_PEERS={0x70c, 0x8, 0x0, 0x1, [{0x6c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x5f, @mcast2, 0xa2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x7, @empty, 0x5}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x5913, @mcast2, 0x9}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x7}]}, {0xcc, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x4d42, @dev={0xfe, 0x80, [], 0x16}, 0x3f}}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "28ca106a148ed6374b6e1ead890894291ea4f9ab3175e5ecb606e1411a17a7d3"}, @WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x8}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x9}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @broadcast}}]}, {0x88, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x6}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xff, @remote, 0x7}}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "fae80574161a49cf34f54aa96a3c10779f859ba5593297e87b3a79f3282e558e"}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @remote}}]}, {0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0x7, @empty, 0x709d2f92}}]}, {0x3f8, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e20, 0x3f, @mcast1, 0x9}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @broadcast}}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ALLOWEDIPS={0x348, 0x9, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5, 0x3, 0x40}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5, 0x3, 0x71}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr="517bbc8cdfefbb289c6ea2808785af27"}, {0x5, 0x3, 0x7e}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x5, 0x3, 0x7e}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0xd}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x66}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x43}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @broadcast}}, {0x5, 0x3, 0x79}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0xb}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x80}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x11}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0xe}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0xe}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0xc}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x55}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x46}}]}, {0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @broadcast}}, {0x5, 0x3, 0xd}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3e}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x76}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @rand_addr=0x3}}, {0x5, 0x3, 0x16}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x17}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x4}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0xa}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x22}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "885ea36260c0da95b499a1c0335a54d8ec478fd60dcc4c3399659e8056c36611"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @multicast2}}]}, {0xfc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x2}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @rand_addr=0x4a33}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x3}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "181c124c22850eb088d728ac781a423239b08f3eb72ebdef61fb67fde0cbd8b1"}, @WGPEER_A_ALLOWEDIPS={0xa8, 0x9, 0x0, 0x1, [{0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1e}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1d}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0xa}}, {0x5, 0x3, 0xa}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x1f}}, {0x5, 0x3, 0x49}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x19}}]}]}]}]}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r14}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wireguard0\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wireguard0\x00'}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r19}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x3}]}, 0x768}, 0x1, 0x0, 0x0, 0x8000}, 0x40805) 08:54:19 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) sendfile(r0, r1, 0x0, 0x7e) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) 08:54:19 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:19 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000180)) mount(&(0x7f00000000c0)=@md0='/dev/md0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:19 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x1000000}}]}) 08:54:19 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:19 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{}, {}], &(0x7f0000000100)=0x10) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x7ff, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='@']) 08:54:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:19 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSCTTY(r1, 0x540e, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@stripe={'stripe', 0x3d, 0xc2}}]}) 08:54:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:20 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:20 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={{r2, r3/1000+30000}, {r4, r5/1000+10000}}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB="02"]) 08:54:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:20 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x2000000}}]}) 08:54:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:20 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', 0x0, 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 348.476826][T30595] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 348.522219][T30601] x_tables: ip_tables: CT target: only valid in raw table, not ÿÿÿÿÿÿÿÿ 08:54:20 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_allox00000000#00000c0,\x00\x00\x00\x00']) 08:54:20 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x3000000}}]}) 08:54:20 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB="cc"]) 08:54:20 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 348.822724][T30601] x_tables: ip_tables: CT target: only valid in raw table, not ÿÿÿÿÿÿÿÿ 08:54:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:20 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="0c2f66696c6530002e19608e5857293aeac1fa654e1db07b20568daf91671cfb77e2da97137fb021d004b19b4ac952e55fc9cdf4266756c96ec5123cef5adacf5c793ca9e1d73402d9a87a0137aa73bf70f989dc53f58600b77dcbb7e1f42a44a44d9bbc252cd2c9f00cace009b5a04b7c27a7c5eeb60ae0b32fe16f4dbc442699bf836570fbf587530fefd1a2e9f388040f87fa1734d032d9559b8c5e789af8aa5a4afe42936e28fa4dbffd39139eb1b9bc3e80675628db29328442f3a0eb356f3454789552234fa19c9f3bde7b2aa538fed5e92fe1e0"], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:20 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:21 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4000000}}]}) 08:54:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:21 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2e2f53696c65302e8836586f387375a78bd749606ddd93a91f0941e5bc0acd636836192e1fc6ecef28dcfedd16c45e3521f792dd37c07ab884c9ae179511cbba3e171e3cf348ba9440c727c9e7f561c672d4af5f247f3e75af2d5f44577ad96b"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30d704d, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {0x0, 0x2710}}, 0x100) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0x68, 0x29, 0x1, {0x9, [{{0x12, 0x2, 0x2}, 0x3b, 0x0, 0x7, './file0'}, {{0x80, 0x2, 0x5}, 0x4, 0x81, 0x7, './file0'}, {{0x8, 0x0, 0x1}, 0x1, 0x8, 0x7, './file0'}]}}, 0x68) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f00000002c0)=ANY=[@ANYBLOB="6175746f5f6461e82a24de7b7322d878303030303030303030303030303063302c00bd506f8b285bd0569efc25b4526361d4ceacfd7da7d53914dc5d55a4367c33fca19c54457ce3726ccc23f53f1980970805c590489ca25c7ab1b89373354dcc3ab3646120421639563274723bf68a6b751c48eb57fabacc5fbf53bac85d018cd1189996ecaa94fe20bc96b1c97301caeb427e8d9705a938ba56ae02c8c99f352533bcb3b5d4247101c7432e92766c7178a36b0297ea457b35ea38b12823aa4cd1a8936edd162f3b434b48f03258f525a66e46f4e5afebef2e2d285fc59603ee49"]) 08:54:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:21 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:21 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x4) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r6}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r6, r3}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@deltclass={0x2c, 0x29, 0x100, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0x8, 0x10}, {0xc, 0x8}, {0x8, 0x8}}, [@tclass_kind_options=@c_red={0x8, 0x1, 'red\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000041) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) 08:54:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 349.686145][T30672] EXT4-fs: 40 callbacks suppressed [ 349.686159][T30672] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000004000000, 08:54:21 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x5000000}}]}) [ 349.748803][T30699] EXT4-fs (sda1): re-mounted. Opts: 08:54:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:21 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{0x101, 0x0, 0x52, 0x2}, {0xffff, 0x7, 0x7, 0x6d0}, {0x20, 0x76, 0x21, 0x2}]}) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) getrlimit(0x5, &(0x7f00000000c0)) 08:54:21 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) [ 349.929895][T30721] EXT4-fs (sda1): re-mounted. Opts: 08:54:21 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000000)) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f00000001c0), 0x14, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000100)=ANY=[@ANYBLOB="6190746f5f64615f616c6c6f633d3080303030303030303030303030303063302c008415daf4aaadfa4e4afb34e943d11acfb471c6cca3037ffbea4b2372181e9914e1fe9bbd961a0f5f5ef7e386b3a78909eb6718583c3012c542e31ed04384b5355a5d7162e277012d43978bbb3393e9fbaff9d352648dacc7625414d067bb6ff4c6946952fc43a53402fe7332addbebd52fb945f280c4d6"]) 08:54:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 349.981391][T30731] EXT4-fs (sda1): re-mounted. Opts: noquota, [ 349.991852][T30732] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000005000000, 08:54:21 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) sendto$inet(r0, &(0x7f0000001600)="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", 0x1000, 0x4c800, 0x0, 0x0) recvmmsg(r0, &(0x7f0000001500)=[{{&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001440)=[{&(0x7f00000002c0)=""/62, 0x3e}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001380)=""/155, 0x9b}, {&(0x7f0000001300)=""/33, 0x21}], 0x4, &(0x7f0000001480)=""/97, 0x61}, 0xfff}], 0x1, 0x40000020, 0x0) setsockopt$inet_buf(r1, 0x0, 0x4, &(0x7f0000001540)="9b0fce1ca41367f5630c6e5f804b4f14e7775164a749f08a80a168f2c70451f29368a2ca961a61c0e515fbdf55d25efe45ef3135d66fef93d260f16f94da684f2095a658745e8f516dc07624c6e8117a35b729e9d2f555aacc7e12e9f45cfbc92e5a9b31240cce2c06b54ebdc022842fce540a25df63a6452c9ae681e94dab3fb3a22deb40182cb05f07cfebc755080c8e3e902056f3372d9d640e4a1a2c5f6a474e6b77c5d3fcc77492", 0xaa) open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000040)=ANY=[@ANYBLOB="05b73b6bcd06aaafb2360330298a5afac315390b6110f94167366ffd"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x10}, 0x10) 08:54:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:22 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:22 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x6000000}}]}) [ 350.249135][T30758] EXT4-fs (sda1): Unrecognized mount option "·;kͪ¯²60)ŠZúÃ9 aùAg6oý" or missing value 08:54:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:22 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000d80)={&(0x7f0000000100), 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0xbb8, 0x0, 0x5, 0x3, 0x0, 0x0, {0xa}, [{{0x254, 0x1, {{0x1, 0xff}, 0xc4, 0x1, 0x8001, 0x9305, 0x1, 'syz0\x00', "413dc8fa72c9a594c38271a6b05cf6b3b81b15471bc684c479527f61283ed1a2", "3e70e0907fca0803c98c77dc279aa17a15c8bd3097678ba65631ec19482a61b7", [{0x8001, 0x5, {0x3, 0x5}}, {0xc29a, 0xf1, {0x0, 0x8000}}, {0x2, 0x1, {0x1, 0x8}}, {0x4, 0xa9, {0x2, 0x40}}, {0x6, 0x39, {0x0, 0x1}}, {0x81, 0x0, {0x3, 0x4}}, {0x20, 0x8, {0x3, 0x4}}, {0xf1, 0xffc0, {0x0, 0x4}}, {0x0, 0x287, {0x3, 0x80000000}}, {0x11, 0x2, {0x0, 0x6}}, {0xfd26, 0x7, {0x3, 0x9}}, {0x1000, 0x2d, {0x2, 0x3}}, {0x4, 0x3, {0x1, 0x9}}, {0x1, 0x6, {0x3, 0x5}}, {0x5, 0x7fff, {0x2, 0x9}}, {0x3, 0x0, {0x1, 0xbd7}}, {0x8001, 0x1f, {0x3, 0xffffffe0}}, {0x6, 0x7324, {0x3, 0xbfc}}, {0x6, 0x7, {0x0, 0xce}}, {0xfff, 0x4, {0x2, 0x3}}, {0x20, 0xfc00, {0x2, 0x1}}, {0xffff, 0x9, {0x1, 0x8}}, {0x8000, 0x820d, {0x3, 0x8}}, {0x7, 0xe07, {0x2, 0x400}}, {0x9, 0x1, {0x0, 0xfffffbff}}, {0x1, 0x9dd, {0x0, 0x9}}, {0x3ff, 0x609d, {0x1, 0x2}}, {0x0, 0x9, {0x2, 0x9a3}}, {0x87, 0xfe01, {0x3, 0x5}}, {0x400, 0xa41, {0x1, 0x7fffffff}}, {0x1000, 0x6, {0x2, 0x7}}, {0x3, 0x2, {0x3, 0x3}}, {0x7, 0x0, {0x3, 0x401}}, {0x2, 0xe1, {0x3, 0x8000}}, {0x7, 0x1, {0x1, 0x7}}, {0x8, 0x7, {0x3, 0x3}}, {0xe92, 0x236, {0x2, 0x7f}}, {0x3ff, 0x3f, {0x3, 0x9f97}}, {0xcaa, 0x1, {0x3, 0x240}}, {0x5c, 0x8001, {0x0, 0x942}}]}}}, {{0x254, 0x1, {{0x0, 0xffffffe9}, 0x7, 0xc8, 0x6, 0x5a39, 0x8, 'syz1\x00', "9699bc1b9c2eba362d04c8bf6776f4642712bf8eb06c0a36b4dd295eb997292d", "d40e04876878011d3a36b5376cf4ffe786efea4ddabb0317955d08b237ad7980", [{0xec, 0x1, {0x1, 0x4}}, {0x8, 0x0, {0x1, 0xffff}}, {0x4, 0xff, {0x0, 0x6}}, {0x3f, 0x5, {0x3, 0x7}}, {0x1d, 0xbe5, {0x0, 0x7}}, {0x1f, 0x9, {0x0, 0xb7}}, {0x200, 0x94c0, {0x1, 0x3f}}, {0x5, 0x6, {0x3, 0x8001}}, {0x7, 0x400, {0x0, 0x7fff}}, {0x80, 0x401, {0x2}}, {0x40, 0x230, {0x0, 0x80}}, {0x3, 0x5, {0x3}}, {0xfffb, 0x401, {0x0, 0x7ff}}, {0x6, 0x1, {0x1, 0x69}}, {0x401, 0x2, {0x0, 0x1}}, {0x8, 0x4, {0x0, 0x401}}, {0x0, 0x1, {0x3, 0x76f}}, {0xe00, 0x100, {0x3, 0xb8e}}, {0x6, 0x0, {0x1, 0x10001}}, {0x1928, 0x80, {0x3, 0x8}}, {0x3, 0x800, {0x2, 0x5}}, {0x67, 0x8000, {0x3, 0x2}}, {0x8, 0x9, {0x2, 0x4}}, {0x3, 0x4b, {0x3, 0x4}}, {0x0, 0x0, {0x3, 0xf1}}, {0x5, 0x5e, {0x2, 0x80000001}}, {0x2, 0x2, {0x1, 0xcf8}}, {0x8, 0x400, {0x0, 0x8}}, {0x800, 0x7, {0x1, 0x9}}, {0x7ff, 0x101, {0x3, 0x752c}}, {0x1bc, 0x1, {0x3, 0x10001}}, {0x2, 0x3f, {0x2, 0x6ee}}, {0xc9f, 0x6, {0x0, 0x1}}, {0x3f, 0x4, {0x1, 0x3}}, {0x3, 0x401, {0x2, 0x9}}, {0x3, 0x9, {0x2, 0x5}}, {0x53e5, 0x80, {0x2}}, {0xec, 0x3, {0x0, 0xf67}}, {0xd2a3, 0x6, {0x2, 0x400}}, {0x2, 0x1f, {0x3, 0x9}}]}}}, {{0x254, 0x1, {{0x3, 0x79c}, 0x1, 0x7, 0x5, 0x3021, 0x0, 'syz1\x00', "0c7abe33ae872cdc7e83517b3b8474459f7c238d69abcf60523ebfb01aeda409", "da3d6e7afb8663ede33d388bb445fffd7ac1790679da690ee3c4b4e86f719b84", [{0x1, 0x1, {0x0, 0x5}}, {0xff, 0x6, {0x3, 0x200}}, {0x8000, 0x53, {0x1, 0x80}}, {0x6, 0xfffc, {0x0, 0x3ff}}, {0x4, 0x7, {0x0, 0x3}}, {0xfffc, 0xa3a4, {0x3, 0x80000001}}, {0x20, 0x400, {0x2, 0x3}}, {0x6, 0x81, {0x2, 0xffffffff}}, {0x4, 0x1, {0x1, 0x2}}, {0x100, 0x1, {0x1, 0x200}}, {0x5, 0x800, {0x1, 0x3}}, {0x4, 0x1, {0x1, 0x5}}, {0xfff, 0x81, {0x3, 0x9}}, {0x0, 0x2, {0x2, 0x9}}, {0x8, 0x1f, {0x0, 0xffff}}, {0xdac5, 0x7fff, {0x3, 0x401}}, {0x52, 0x9, {0x2, 0xfd}}, {0x1, 0x3, {0x1, 0x4}}, {0x2, 0xf801, {0x2, 0xd5}}, {0x9, 0x8000, {0x2, 0x4}}, {0x1000, 0x200, {0x2, 0x1}}, {0xc902, 0x0, {0x2, 0x7fffffff}}, {0x5, 0x97, {0x3, 0xfffffbff}}, {0x101, 0x400, {0x1, 0xffff}}, {0x8, 0x1, {0x2, 0x7fff}}, {0xee, 0x0, {0x2, 0x2}}, {0x2, 0x1aa, {0x0, 0x7fffffff}}, {0x1, 0x1, {0x0, 0x2}}, {0x80, 0x8c, {0x2, 0xd5d5}}, {0x3, 0x7, {0x0, 0x4}}, {0x1, 0x40, {0x1, 0x1d}}, {0x5f3, 0x55ec, {0x1, 0x2}}, {0x2, 0x800, {0x3, 0xfff}}, {0x1f, 0x401, {0x3, 0xffff}}, {0x0, 0x81, {0x3, 0x9}}, {0x2, 0x1ff, {0x0, 0x9}}, {0xff, 0x1, {0x2, 0x27}}, {0x3, 0x0, {0x0, 0x43}}, {0x480, 0xc544, {0x2, 0x3}}, {0x1769, 0x8, {0x1, 0x5}}]}}}, {{0x254, 0x1, {{0x2, 0x7f}, 0x2, 0x4, 0xefd, 0x5, 0x5, 'syz1\x00', "5e84b9750172bdba52aa40bdd1d80b236587c5a989160d16c0e38c7f541d864c", "6e8ace67e0101a41a813bbbe2cf2600298ca9c7116e946573027aec8e439c696", [{0x7, 0x8001, {0x3, 0x62}}, {0x8, 0x7, {0x1, 0x152f}}, {0xffff, 0x2, {0x61d8d77f8057f4cb, 0x2}}, {0x8, 0xffff, {0x0, 0x612}}, {0x1, 0x63, {0x2, 0x6}}, {0x6, 0x2, {0x3, 0x4}}, {0x3, 0x7f, {0x1, 0x3}}, {0x1, 0xfff, {0x2, 0x8001}}, {0x5, 0x9, {0x3, 0x800}}, {0xa, 0x6, {0x1, 0x8001}}, {0x6, 0xf800, {0x3, 0x3}}, {0x7ff, 0x9, {0x3, 0x7}}, {0x4, 0xfffc}, {0x0, 0x0, {0x1, 0x2000000}}, {0x0, 0x2ca, {0x2, 0x7fffffff}}, {0x0, 0x7, {0x3, 0x5}}, {0x800, 0xb2f6, {0x2, 0x1}}, {0x5, 0x8, {0x3, 0x5}}, {0x0, 0x5, {0x1, 0x20}}, {0x5, 0x9, {0x0, 0x5}}, {0x1, 0xd387, {0x0, 0x6}}, {0xd875, 0x8, {0x1, 0x4}}, {0x902, 0xfe3e, {0x2, 0x8}}, {0x1, 0xc, {0x2, 0x5}}, {0x20, 0x8001, {0x3, 0x800}}, {0x7, 0x0, {0x3, 0x4}}, {0x6, 0x3, {0x2, 0x20}}, {0x3, 0x8000, {0x3, 0x4}}, {0x5, 0x6, {0x0, 0x6}}, {0x3, 0x101, {0x3, 0x81}}, {0x9, 0x6, {0x1, 0x7ff}}, {0x9, 0x363c, {0x2, 0xe0}}, {0xfff7, 0x0, {0x3, 0x8}}, {0x1, 0x100, {0x1, 0x6}}, {0x5, 0x3ff, {0x3, 0xffffbe1e}}, {0x4f, 0x0, {0x1, 0x11}}, {0x4, 0x5, {0x1, 0x9}}, {0x4, 0xbe, {0x2, 0xff}}, {0x1, 0x7, {0x0, 0x6}}, {0x193d, 0x8000, {0x8469fc96f40cb239, 0xe390}}]}}}, {{0x254, 0x1, {{0x1, 0x200}, 0x7f, 0x80, 0x1, 0x1, 0x8, 'syz1\x00', "da5768b4f7c786c46f2653b26c50f51a33929df5f61ef06b157837f3ac2fe337", "ecd83a7e749a93a58582da8766eb0db28b4b98fc0f49dcd9f5d6fc062880cdb4", [{0x0, 0x7, {0x0, 0x2}}, {0x5, 0x8, {0x1, 0x7}}, {0x9e4b, 0x4, {0x3, 0x7fffffff}}, {0x101, 0x6, {0x3}}, {0x0, 0x7f, {0x0, 0x7fff}}, {0x20, 0x5, {0x1, 0xd5}}, {0x1, 0x7ff, {0x1, 0x6}}, {0xe000, 0xf73, {0x1, 0x100}}, {0xfffe, 0xd965, {0x1, 0x5}}, {0x35, 0x2, {0x1, 0x4}}, {0x9fa, 0x9, {0x3, 0x8}}, {0x0, 0x20, {0x0, 0x100}}, {0x6, 0x6, {0x0, 0x24}}, {0x0, 0x1, {0x1, 0x80}}, {0x81, 0x2, {0x0, 0x3}}, {0x7fff, 0x2, {0x2, 0x8}}, {0x0, 0x1f, {0x0, 0x6}}, {0x91db, 0x3, {0x3, 0x76}}, {0x0, 0x1f, {0x0, 0x3ff}}, {0x3ff, 0x2, {0x2, 0x7fff}}, {0x101, 0x20, {0x0, 0x101}}, {0x401, 0x0, {0x2, 0x7}}, {0x9, 0xfb2, {0x2, 0x1ff}}, {0x9, 0x2047, {0x0, 0x6c2}}, {0x3ff, 0x6, {0x3, 0x3}}, {0x4, 0x400, {0x1, 0x3}}, {0x3, 0x1000, {0x3, 0x1}}, {0x1f, 0x1, {0x0, 0x6}}, {0x8, 0x81, {0x1, 0x5}}, {0x0, 0x7a3c, {0x1, 0x94}}, {0x5, 0x80, {0x3, 0x8}}, {0x2, 0x0, {0x0, 0x7}}, {0xe3d2, 0x2, {0x0, 0x1}}, {0x9, 0x3, {0x2, 0x9}}, {0x2, 0xf3c, {0x1, 0x554}}, {0x3f, 0xf6, {0x0, 0x2}}, {0x3, 0x9, {0x2, 0x3f}}, {0x1, 0x600, {0x0, 0x2}}, {0x1f, 0xffff, {0x2, 0x7}}, {0xff, 0xff, {0x1, 0x97e}}]}}}]}, 0xbb8}, 0x1, 0x0, 0x0, 0x40084}, 0x24004000) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000dc0)=0x5) 08:54:22 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f664d46cf8ecb"], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L+', 0x5}, 0x16, 0x3) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)=ANY=[@ANYBLOB="6e0104000000000000"]) pipe2(&(0x7f0000000200), 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) sendmmsg(r0, &(0x7f0000007680)=[{{&(0x7f0000000380)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'ccm(cast5-generic)\x00'}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000400)="3f12a5ec3513eb0d4e13fbae9bc8830f838bb4fb00ef695d0e43ec5834a627046c290f6c21d334c54147a7705a8c6acf3e4764c20001d91431de931f5edf5a3cf1c9124e845ad32bd03a5be6b6cccd0457ec32ff47f2e0d8b20e1484e0040f8ffe1eb33fc396d85bdbce9d889c0d47847a8ff5c1b7ebee0a9c1ba5bb93526ecfb2776573076bb45a624e0fe5d002cafe85c6864c4303250393ab215628a14ee2fa0330ac73929930753c9199a6780775b8c14e2e703e053385523f8e9f3d6eff3c1c3f1aea74040ee9d5b00a286398eb3177347a7ea9394d3d3be54f1e59b39e92a9805ba9a246d323ea", 0xea}, {&(0x7f0000000500)="b4f992b447d780ef2623404900f4632b0ca272aaa7eb6421be61f699420f6c8814d259cb6d6699a237ebc879d6bdc72ae2931fa8bbb2e8c4211197a25715cebbe83ea1a4008cdac7b00497113270bdcbb9b039fc8f7fd63ccac2eec5edd6bac82a9ad96f71ca1dba85f776a3098cd5bc44637caf424d825e5370c07531055a0b82df", 0x82}, {&(0x7f00000005c0)="9aed01d5bcc270b8dcf0a89172e82b32c35374d632e131b9393f2943ab0fe2a96c5b32798f9fa223dd2d4c4cefc3eb21401b708b495cd6fd9a81b684784db1b64ab10b2bb440ca00ee6ab732671f7730c7f16ea75e88f21177cd27261eda7493460fc3ddd28557edc3a393b4765fd21b6ed9fcd8a97d3b56", 0x78}, {&(0x7f0000000640)="08ffde4013ef03315bc948e4aa8b7a31d2a7b4bb781705f7f68d4e9f04679822f5723c0a42d0abaef56a97121c16fbf280556007fcf5ce2f976f525e166f84201baf501216a5f67c6ab91b4cafd83322ee9663c7418127516c010df0358f522001bd37cc6666aa03d57dba4c5c8f8688dd15daec155e0031a59245899fb7279d4054e707643e4e71c7b17f04628a390033864bb328e5bbc0369bfe0a1728377d1260b1308ff4c4554eea63bfc4d9971e847f9cd9f5f8f1b606a45fd9fe0a94f9195146b01d20870d5164fb6bea817b85c514766b65f60e47e486900e67888a78ffb7e2ae6cf17fdc5cb1fba497cd0b2096f5d051da064e", 0xf7}, {&(0x7f0000000740)="35d466d293a55eb3fc265967b2dc21dc3c295dac803a46ebfae271bf6395ca8c3e85764332f238485f7609a68843fc2912a0de9206d691", 0x37}, {&(0x7f0000000780)="495dba20b203546cc2273e5e8b6b86d83c76737868e4ac8e43668eddd4ba41f993714e98c33ddd0563b05be81b804aaa9ec2704e75ad4a0de599bb5ec27468deb7ca876865cb17fd5cc9189b5a36e04752ae00371c6d0b1c47", 0x59}, {&(0x7f0000000800)="315ffca3ba4c026f835e", 0xa}, {&(0x7f0000000840)="3045223fd42b4c3f03ac6cc5cdac317ad4f4f12e4c5d40af66", 0x19}], 0x8, &(0x7f0000001980)=[{0x1010, 0x0, 0x4, "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"}, {0x78, 0x0, 0x400, "ddb63e5c99bc1eed896862e6538d652fbb0679d1fd82d3161644f2d107cca72b8ba2ae12d0e949520b0a971af0812308f676ce42ddc22e006b50040031cf4757ca92cc2df8c20e2719fdcb1a7c8e12c522b0ad06d6715f46395dcad4f204d6d26c898d"}, {0x68, 0x116, 0x765, "53a64105f8499c194d4dcd7c8919921ca35708d1650b8b634da6759f05594c79dbb59a38a6adcc98c81b2a022cc8bd6de9ee6ea04b88c4be1bd9f9e2dac98ad5756536d370d8b8f2eaae65476f6a6cfb9a42bcfd4b4b6f"}, {0x18, 0x117, 0x8, "ce022649"}, {0x110, 0x10c, 0xbe32, "8aae606a88fb836c48945e0e9394a72796185aa6a7a820ae0592312ebe247407b114e5fa87ef1fdd2aa038070fea9c84de66c44a4b090cc9142b1aacd39ac05065e2cf8ee945f07104f83a7f7881613b31afb6dcbaec05eb598b4f935a79a0ca18e58063990dc7e9ebf160df716e97dc98edd2ddbd6f2b90463e5ef08b0380f877bb9cce3af6d6d20d3d6afe745a57d4ff62b8ed6bb4bc55ee2af948282ff4e6aea7d19a5c1c8f6263774b973cd9bbd80be2d36ac2176593d77d21d5a860399de6f6f1639e934f03162d20f784b5b80076ee62e2579f3ada4e9f53c8488ebac1c65ba1b243db8859fe1fc4687bd41e30f59cf43d35c7494c478355d95a"}, {0xd8, 0x112, 0x81, "b5f75aed0b135e0361519daf230f9cca6f444999c8804e42293585f05cbefa93143f937523c2b8eec7fc09fa8d253612b1e4db4dc704cd84d098bce82a507459fc26be83b745ace136ad7f5c74c575cc3b9bc2b862adae52268c5798f7dedff98bf08840623c325d31b976356f6e2fbeb486c3bc27acf476550bbf6725d212e4d3a38eac927d51f5fa8fb3e47fe8a8dad9e59689170969a4e8ab0bf8764bd6456f4e023f9ffd37c470d5d206ad20909332bfa362cfa6e8d0cef1fb83c0e3800f65"}, {0x18, 0x29, 0xfffffd5d, "f2630e43"}], 0x1308}}, {{&(0x7f0000000900)=@l2tp6={0xa, 0x0, 0x9, @dev={0xfe, 0x80, [], 0x36}, 0x200, 0x1}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000980)="f0960127578adb3de851a1cfcfb40fc1f19673f86d3080bf5bf089726544dc79b3aa8b260fb8891df17693f919bffefe53bf1be227709ec1066afe803b2eb8e0c0043a3759dac431c647a52c91df1cc92a17f72383d3378315f3ae5e0f486fb5cf5b41a1367adfe00d092a4a2f57608a44c6adcd3300b8a5e3722bbaaeacb569ed47432c4066554d99d0f6bb96ae59ac8b5a3a9f57c974eee63dfe7f77296ce3e233c58879f8d5f0eca015595d17ea533b195ac466f7fe61a4629403a97be06a151c44d46fdfcd960c82f3123112f9ac3fd6a2acae6baf5129be6e561c", 0xdd}, {&(0x7f0000000a80)="86fa1026902d73cf6b616018794dbae242f16dc1b59e9ace3619e2917dda10d67e668bab55d78ff20c7c2fb0efbbc7abe8d2696bea6ef06e146573777730edada7e887d697007f83d6891180f71bfcdcf0", 0x51}, {&(0x7f0000002cc0)="7daef2636b90c95b42a779c0c5af61cd2502f8f8c0262e67fc104ce8d65df8776c202310794a9c7e86b8980c8e56ec6088192dfb44cbea084c1a5bceb831acde5159897baa7c4e74e4f7d7afcc6efb33bd8fbfb339f7b1bf30d26f6e58b5434d26cd8c8b5f4bb5d1085db227315bf3f7888219e847e364bd032e6f19c419e144e4edbd4bbd283cd712c0c598a661a5b25d5dd5dd5b30521d440bb712c847d5bb09de4efd55c009b7cf59beee2294e26113d33dc136fc62fc02ae67c947808ac30a10151ba94446f6a1905624872b9d78b92bea7113a667e4d11dd8479aee3c5db102f820853f3cd212be61b07bb7c365efab51707e79f65b6fd03f2c22ff3ebe73945ea379f08d03e4055e8b91c3ebf74df6f7e04cb5e575783177387ad5a81ccdb5aafcdbd8d81073cfed3c7fd7845001485d0b621b196c33967a8aa2024e599108d888ebce3d504c29940f794457bc97da767bf23e766733e3f52b6ee75023a35c51c51d3778ecede8b3307292ec9c27ebff52d2047847b02527dc3f297f77cabf062fdbf641730572e33e7506ba17bfc4cecb54e7726b2f724a095f542ed8b21603b94f86ea01caf974a55a0b7316215e2be8ce4b7ba06529054a485d33392a87c224fe357cd9256e914afd0c0804bce00102bcbf9ea40e8be4913de1ef046fb88d8ed4a8aa105fb287ed63dec2ab3d7f9904a379516de40c6aa0861d6472d09efd7a2eeccf1245e721c5273325cfebe763c905da0906519ee8a07dfe84a096e7c42df92f47634f8807f69f0680fdf45da8b7780a88c7cb3b7ad60fe8436fbef2b77271d692919c214421732ad9e55a108cae11fc4e346b480684b186b3d56b893ee20cbb9ab80fada3badbcfb576259c5411eb4c9e74fc39d18a8d6a0959bd4bfc789c6f83ff004931b5322b890790f7bb4afac6fe8e8e60419c7021e40c7049407848a25c5762062117775b87ec6872ca3cb101461ad43a67cc5b9d599ae4adea8b33831d84fd185036a63c55bcbc43700a0763f27f0894885563de51edf27a2bbe2af997b065d3248bf3e2944d614595e8be26c6ee1c17c44f35399acc898b7defc5ad3021c6a3fa8d35697f77460e5f337790e9d1c1adb06845b2f730df01030d0e4cd1aa97a7c36fcb1b763ecb8059d8d46113188027d0a1e4db633200ed7e2ef6b5dd9a862cecf58dd34e321b106235eb68310161db4d6721b2e84d79b9b4059f9f00323ac9d497479c7e00cb626a8a97f13012ea87e61e9083ec832cd09830eac45c1243e976506212ba0ba21a565e93b6dbb6957ad4d4b881851a0f6980a61837164bb72270bae1c7de7ce6e6c432b6be0a903a583190ffc87e2b48b937e87329ed3302886ad95f47398185e300bd90accaceaa24f4905f25b31f7cc2734c0049d6f8f2ecd3fd5b1ef510b1c0457fa69d65c622b0dc83df22bb476464fee56fa92790e790bd1e5ba94fbb2bb5744b3a414d964acbed43eb69a2aaff08335e68f36a0f4052f8ad754eb6b310e104c0ccacf1e0367b390051bb1fe6f6590f2d807e7273ca07153480a686a1b29af222a74822c1a7f1cd7313f1451fd1188b9121ba7b77e983a0759a4781d434dd83b9e0a8a551d1226a5296cc3c14e88f9064b9de54809bf17d85241180e1e1d487113b738b284dbdbf8538a58279fd598cc835254777d7da9c47fe9167e02b9c1892a2676b8293bda62141959c490524c8d0ed5177193ddd130d60b53ea3c79dcb2334119eea6dd312f84368a1f6cc815b9c2c14abca17dbda27bce92c4417370d6d13ffd765593388441f402a655af1388e2202f4c7cd44c854de660e23b92ea0afe7b5c3fcca4e5d18bcb44333691541a8cf57c64aae9b02947f40255fee70133bc15b7272a3c8a85b8cc73ba82d3b9f2eba635d56b35a062ce3e509802b8c42ce54466c8e8a8f574a6d1a72102d2f89b7cfd869e865a17e02dc92698b2d314b02220b8c3c2599ece528917861d538eb9205b2533df99491366d0c0b0894426764c6cdf6d5a76b936260884481ce60027ec6180e11543ab34d5887d89d8a608e78306627a9532541bdf9e6dee099e0a2b831a39aa64c6855eebdbf9568ac70af5fc21e6361a123fca3904d396a7360ceb5e79124e1d4e423740bfe74431123e0ef5307cb4145ebaf92a941033cad97dd25a4294a8f88c9ee6a0bfdbd104c1e24ef4c2d922e20ffd4c71c5c9157ddf01614d9d5e9c6843527bc60f536c9176ad2d2549a25706fa32b62b93360a12161bc14849853645e77c5047a81d8ed6973bb45cc1f2a7f0790dde64e9e2c6de52972b1777bd7541f48aeb3f4bdd69ec5a17bc3f91c6eb3b453e46a6b7f3c6994618fb4f68c1acd8f1d476234df458842daf9b83ef69289b93295e2f28cf20261a36fe8e33940c1ddbd9f1408e729f61bc082aac6e9dab50222adc63f9ea6a9b515f2b033abde102df49bdc057bba13be1d998260d7f46bc8b7baebbbfad47ef73cd5683d169ffe521fa821b5112e1b3efa71092972b9719f93695c1a8d77719d9eeb15159a7fa21be133ad2410222fd8c629808d10acde4d2fea2fffa846c33514ef1241c347cf0c330c347d5a0059f4a8134b2677bf569a962e6b2501ec024b7306ffe6ff653d4c4acbe74be67777d82fcecf135cfead98e7bbe545a5e732dfa101de47c1e6f7c4cfe4bc4c5dc2e59c86d959673b78a1a27c606a6837f140b307494b1bbf671d4eb7e764ab91de2bd9a79c510f68ffbe953779d3296f8872c4e109b31c9c4d45e4bf5f78c8fc0d1d8fa371c32f50c7cb5134080c2f7bf75726a47851822fd13f5681258959a829d4da011814bbbfe803aa19dac36d7ddd904ba9af9f34b414ee005aee27f8c70268c05fa19b3634eb476ae68109a9f992fd7b4078382237840eab53e1c2e4f22a02d22c161c7c3d43d3c85d9f2d9402f1bc0f7a7e5b2327b6f846a21ea8ef9510f233e474b130a425e8f309d79c82b6c473b9c25efadc4a59933bbe0b39699945fd252b625906b140aa29fcdd74294e23250fb65472f95dec86768652c7e202b6345003914e0bdaf007f698960119deb4a0d6b29bb32f5101fcd7ca39c0609e0108aa86d99de54130d7c07a19a0970c32008c96bc21ea63cd5d355b3cf455015df1e67f27d5d2461b54d6c2a6ad17f469f3470255e93f06a4e713ffe8fcca0519bdf8a168716ef1e386923aec91099612bd356ab50ea1d58c7721f27c0ea2b306206b4562ee96c73dcd20953de0b4ebca640c304785d476f6c90409fa8af0d3efadbefeeb3f21fcec8730591a20618a9ce017c4dc49c75a4d70c7633aa4a84f15afd9a9fdde3318927faf008dd9a2c314082f084cb2c7d0a377079c2a8cadb0d1036e2bcc876d95bcf927a51a25c6e10be29b114178f486545c8c5caa01844b7efbeb3936e183a63b39b561b5517028c5eb493f15d21252aafd3a02cd135c1938a948e9fdc12aeea89b9305355fc24ca14c7bb185bf9c4a7e7c218b6164870e830a2f5b65cf7de8106545f14081993d333d93e85d6e96b93ee023bb7ef20adad90679215cbd24b8a74664736a5034bb46cdc441ec8430d50e323e799f9822e8c1eb65d2bcc477a19422af9bc5a57e2a25ca0174f87e8ae40c228d7f0d05ddc2095a087ef476d59c4147fd0c162a05e82a155236506d6ff33b430855e373c98a5e76e130d99809b05ef88aa127a82285e0615988493292470792d99d2886a1a52cd467d1a482e7b3170d5e89a5d4853fae4d44e763eebff1a4684d0967ff18f1e3de0eb22dbdb538591cba2b893e0476078d7669945a08399e82dbd309a4e7801bf9cfbdf04677373a9d06119f4fca208cf16ca7e4da0c8482e3599e3e9ff8084ac678de0b8c70ddf5a779ffff8ab3aa3493c084ce5f2d696f87eb97b923844f7184412436694987c03479babc97d1bf7aafb814d48b0e25b47f109d34caee35c4f0539dded2c561accfac571a36a454e94e8121f3a62844ffc97eeb8f1ba7db1b0c4a2949cac4a638e2e4332d25f947b5505c5e67347d79835447e508e02f1fa523b7bba8be5f537ace7df5e6ec09db4794e1963e7b6e962780ea06afc95b28a54ba6bb76e0f9d0152728167edd716b093805af5679f9dd7c1b16591396a775ed6c4b2f2685eaab79d4c16729c889b4d1fba2ebfcf51803a92180f4d0328e1a25e0377448c8739bb94e8369adac67fb894b021c70b8161aaf4239309e4c009b24fb1c382f5270c87eaa8874c4058104ebe6d8b956ff13c5398104230184d631a61fccf766510569a325e9a1e9294b493abac456f748bbf384fa3746ce18b10968c399b6d6ff7ab6c1488446fcf71790823fa1d95d7b1c43ddce5a0dbca145285f19a9e7f0718f38aa44bbbe6d2958da19aef4a897e08303865c9e632638ffd34d2f71b81b8bec25c0e8c8b2363d9b76ed6a64a33fd9946d85b8481d8d09d5cbc7ad669d5bb61d02b8d61bb0ac2df480f3a7bf9e3a01c406f3a3a7361b5b9f7ac512b6f9262b163a257a282d83187ed28b40a39b9d967826ee812aa4daf353e82ab32b7c8406a577fb34c2a79cf3b76e7b7f6980a7db107a2e92ecacef4f5193d0f01ca69e576c2e280dcbdf04248caee868e28027ee441430cbb3f073dcf765e2fa9806770b386ce1f3ad8e6205faddbf1c8961526f8ba4eb7ef8f345d0aa67420a78b59d6f80f6918a0cd69698393dfbd56a7e91e283fd991be7c3e6f5ff6157fa1dad65ce5812eb56ce5a986f4b79bb209d77461edafec095db75e1f179ca5f5ad32b11e1674437ff175afbf8f779830544454429b0a0a4d185fc7c25725f6641074375053a403c31106353315dbe1948ce5a4484fa1ccc36c1abcb53090f8d3ed00969ffa7fde9d8d7d45b15a255ca22701d2da3a5998e6d60310db33824f543fb4b5afce9f3f56c761191e4cf9b7c0c496af8f39ccdf7e53a7271f71c5db9223be060a0ac25a256a96b8961bb5bccd5a072209835e9493f66de76ac99791b349709051199bde9f233ddb9fd90c96085e595fb900ee18e61e87ec0f01f20bef791d229c50b44f36ee8a69fadcc34b24426e86eb48a2f39cbbaaa2297345d38170d9ad101ab02a7228fabc867f9eb472fb374ad79939294f07acfde6ea1f199881704c94c877d23a936c49f2d3bb48424b0cb74cdd4ec3e6f46e573ac02603c1dbc1b44bee072e8281782f393b5f49f081a65bf9249180f973fcc04985abdd7c330bfcbd3bda46088f52fd4242e22be82e668e9ed022d59873bfe0d5ae9ef853cda8ba819c86581561f966ea929258e5ae63b24ee6a6eab3d89041a66b09648e3a9a52015f555a31396e69f65780f0578c175e125a79fc9498dc5c629db806d82cfc69e36d25b64726ce9f7f47f25b9becf349f7e38883f13970ed10ce5bb7c8c016a9ba1070a1550098471785e9ba0277738ad394039d6df1ad8f5f0419d25cfebc540dbe2b23c05aabfceae451cc61b9734881515dcce5b120388c0ccdbe5e0352b7fe5e67586417edcd4d94b610e22e9697354f072fc1c9c7c9549957ebefcd94e3af4c365764b45dc7daceafd35a79c4dfdc8bb7a8dd0ebfd78f3f50cefbdb5803318a5356fddf1d73b501215dd753a77dda6d27d3a3bfdd7204dee8d7d92adf8495131392c70e237f604d46df5c9821eb559ba6d3607539cbce1098f67969e5c405e2fa6a0bca0dd367825cadf163dee291b31c28c65be613aa975054dd6822a7489229077a11ee8da697fa6a3dda0fc6a43d061c8c5a3799c30197568b509293188712df5b62529f3a0a762c7c6", 0x1000}, {&(0x7f0000000b00)="386efff050c27a7b8dd618bddb08d8d95a5fe290804aa439b04b0d72c5410b5d76c52cf1a2e4206b682861505d249c4622d2fece0139cb0018892d60cb7531bb8ec774d66ebf3eccf4f90a58a0f4122f7e99e3e0e5c33b2a627e48c3e4", 0x5d}, {&(0x7f0000000b80)="c423", 0x2}], 0x5, &(0x7f0000000c40)=[{0xc0, 0x104, 0x81, "cb639c1d7bb46571de3c3ca23163f9c7aa3925e9acd046dd42ab9df57a03c36424f62771009c055b0273b12d5e21c51e3d70a8735655e4f964118ab2e5c7dd96cca2954e8a473071d6a99881fb5def8a763e3edf88a5759035fd8d0fd508c2e6c0924b8294938568cc3488343f6b1876b67c17b39f2b43c45904e27d69491533a952b8e85c1123c556a7cf4ff12d189bf71d6b7eba4090a337f045716b1810538e1112863762dff49c"}], 0xc0}}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000d00)="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", 0xfd}, {&(0x7f0000000e00)="42151a77d1e7710b55faeab113aac573201072ca4b061f7b4cbbd496303ef62312919aef41d7290c2e60f698284ac34c8caca0", 0x33}, {&(0x7f0000000e40)="02aa7f499ccbb05d924a41c2892d875a6fbe8d434e753aa8b1fdab5249f00e9ff8697779726859ba079be8106902e5fc5c2c3f1b1f2e6349beec5563549af77a211cfe5ead8f92a389400f5313a03be29276a49c96f1c39a8e6cf198b706d6ff18f865e49da555d37e5d3985b4e6b156c4850cf20bddfa934f8c5bfbad76ee36b1741a61ba6898b1fcf720cee4cfc9", 0x8f}, {&(0x7f0000003cc0)="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", 0x1000}, {&(0x7f0000000f00)="e72088dbed5d12e769a3cfae39a3335ef1d0b93cc3bf815c05bb44d0c6512cd89712939fc0a63b2d7e44e7fc8a14cc995c8ea2983420f5218f259ca4cb3143cfd8a0ae75015bd9e929ffea7afb74443e3d26d9c56841792c7d1b9691e47253d54ade8dd6b9f1a514d6dd33efa24662e351e4b1e1b54fb5e3b023a6099e6f327c395a2bac26a177456ad3e1f82d29eb536067a5c9ee971f12d1909548fcc1139148d40f68c84edb5e76eb40bd3d83d5d2cdd7ea858c979ed27f73d31a6c02eab216825336848fc89dcd11f37013f66e9a0c5e7d518ca74e5e27c088f452a9fe62150843030def86184cfc3b6afe78c121f8376c5696160762feaaef8dcc", 0xfd}], 0x5, &(0x7f0000001080)=[{0x80, 0x109, 0x81, "0a7e5c44dc947ca4bfc7e04a83fb2bf66ae0cf76f5dae780df08b88c58da11fe2b440c05166c67547088e9ed76c4f89381f50a223e5a531d3da07ef1e05000eb5a9f8bef845ade3dfadfa3173d4802560b03d739f2eaf33fd9092ca9ba12c50fdbea9578c2eec6a67611441f89987a"}], 0x80}}, {{&(0x7f0000001100)=@hci={0x1f, 0x0, 0x325d95df3f7b4dcc}, 0x80, &(0x7f0000001280)=[{&(0x7f0000001180)="f1b8c147b54defa3566851ef92cba1e6823317cd5e93800c415d9f8fd408862484dc5b4c5227ef52b15d884e9805f74308a010d979d7c356451d7a7e72895aa3d13c9f9e7fb2db80c4b9fbeae043322467e9ad449a55a7fef38ba48141f7e250ef62c9724a61887abab59e1aca06cdd70e90d5b4c2d71ac6331fadcf18f4198d51f028b2ea8e1aa4c901d74ccdbb66f4eb5f7187e471cdd47f5d91067adf70e26d9e2233c3308a3f164bd81496e0988ce34a320329dbf1306768f5e607d2cdbce842880e88b0b28f", 0xc8}], 0x1, &(0x7f0000004cc0)}}, {{&(0x7f00000012c0)=@pppoe={0x18, 0x0, {0x0, @empty, 'syz_tun\x00'}}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001340)="78962a79f1fd55174ca6320b3915a443f50c816c8bf1d2693bf2be9dddda230cf5791e0d7d63393ec6ec4901b1f77c7d62c49cf02b9a98b24144da1e187501ab4c49387b6af12f879572c6f775735970f6768517415a9db805ac3f5d97f630e2155f9d8a312cff5da806f70fad6b157c9739911d1e4f554a3934128e53720ff5e9fa50f19e0c40e536fbab9eb1d99f585bd8910f1f", 0x95}, {&(0x7f0000001400)="538dde46de7e2baf03dc397ba9065feb23b7a84e5ddd262aa7ab4fa39f259a44176d960d50e75a2e1d4c3bb10c701c9c799d202ef3c27f1ade2b52d5936397f0f3d95e", 0x43}, {&(0x7f0000001480)="d85da035a4e6d6d1dfc1bb9dcef0d42956605121c0518a947f9fef911155fb8e8d9f0fc42b69f2e9c55b9cfaf30da58da12df45da9e89bcf07db6a5f017739da024854f963a03aad8f1fc94b2acce4d44cdb80d37f7e319145712f4186aa1e8a75c031bdc1741c8c", 0x68}, {&(0x7f0000006d80)="02506f052b21be42eb7abce618f8a71d7b0dc5984476cc9e3bdd5fce208a2f351bd9a524dfcad7a0bb1e76f5373a50e9d646c70d49051ee21c3d0708e7b53254a6c28283327f8681444b1dd3c83ad2cd9107f70ee349d9e82ed57d0a9ee5e4037511efc6373c87b71d99643d0fc2c7d7cc94ecc3a5ce59fbc444", 0x7a}, {&(0x7f0000001580)="8571316fe5ae00934764f4178f6682e5e80237ef33", 0x15}, {&(0x7f00000015c0)="f4238b09a5e882fcf7269d5cc154652b7a6360fb25b0df032470d3184161c5b5a2b8baac2f95e483fa8e31a4d943a2afbd8d727762c2fe11c08eae8899fe1c7e1ca2a511999399750c699a2d6b1815453a1de1f10d83e774f79f8c0fe4e9d87925bfa0f00bd4ef9397d2eebbcc899e9ec11c1acb1bfd9a9664da1e7c63d0f49f", 0x80}, {&(0x7f0000001640)="6c656cb93b30444e508746da3d886bd820a76850a08ac622f4b8b67f47ebbf50bfc99bd92f76013c33d7f7bf8ac668e37e0c69a1a19af6762ec5dbf884ddccd0b9bfb60f034fcf4494887c6b685440506d4616d7", 0x54}], 0x7}}, {{&(0x7f0000001740)=@pptp={0x18, 0x2, {0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f0000006340)=[{&(0x7f00000017c0)="938ce2632f9c5fbfa643fe38201088305f45082e73c2ca1efde28de43440d850fb1d18c4d336404bb37ca39fd291da7d409a76ceb73fef48287c669e3eece04a630a4fceba7ec812fbc8b22a2bfddddadaae286f331bad3a2bcfb78cc19c99fbcef8e72cf6", 0x65}, {&(0x7f0000006180)}, {&(0x7f00000061c0)="f681eda2db5285d7e454c635b33d5b00b8122eda76e0614296686f3287630011c7172b3dd1e046340ee760f101d41189095e95cdb5f7fd55013cc0179aa44fc7c120dd85dc653bc0e216dfc053114cc09d8bcb236b93cf3dfa2d1fa0a543c2def582344af825a5f328f65c0714f8c69ecb071a4220b84b75a6cf07aa6d4b525a20c1e134f27b2dcd143762d78d066ae8f888b0ceb90d04cb9d01cb8d57411397ea8b5cf70481d094ea4ae4ceb46669c6816ba0970975aa62dcf7ad9598af05da9cc87e1ac17fd19a2363b91b44c1c56b6ad60f18929bd9feb3de7a06c615bc", 0xdf}, {&(0x7f00000062c0)="0d45dc0ea8ea96e440f0f982e077b2bd7261d2f26915ab541b1de5295e2a570cb6c0240473e06a29ee57035c044d4522fc5102d67736b7e7793608cc7ebcc66eb5e79422", 0x44}], 0x4, &(0x7f0000006380)=ANY=[@ANYBLOB="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"], 0x330}}, {{&(0x7f00000066c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @empty}, 0x2, 0x1, 0x4, 0x3}}, 0x80, &(0x7f0000006c00)=[{&(0x7f0000006740)="d033c81bac60c87bd193feffa23c07f12c1a78f43c536b85d33e9d96fc8b2792877ac3bdf930ec8ebe8798b100b952af815ea51618c32661ae48590c1053154e051abf5760dc6cfdf923bc5bcf", 0x4d}, {&(0x7f00000067c0)="935456fa42d8a3e9f5dfce27f17b3c14f7c0277419040ce86617f3fcaef0718688550a069b2d444c5b35987d1cebea7b396cdbdfc5a466822a4edbd89f8022df0c8bf1f63c8e74e60fce087bacf227e8d5f0a6959a3c9a923976d9615e58b5ccb5caf63280ce9ab3278ef664dc1605f436e30dc7e30c304a763ed919701d1c3b36d3964f800e0e27cc54643a14c5fa35ae525d88939a5138ca754c28fd653f8a7c0a6c7be6109038d6b5d1259322af9fbc7fa61c363ffc1402f0293cb4856f1474b861a3a5c85b336f7b90da55a13d00572d1d7b7975aebb9e3eb97426328edf7ca81d16c8d6", 0xe6}, {&(0x7f00000068c0)="4b63d94c6d7401aa5249109048b2b5771ae45a32", 0x14}, {&(0x7f0000006900)="2521061db968d4970bedacc51ec2ff0fde6ef8e72024ecca8cf353eb2f4ae7ee1f715abf7ba0085263e0630ce52567512bfa4df82f8249ef592157f4bca9917f0974d104fcc353ebcba76ca028101a48579f5f184575f0f544848334eadecf78ce4f3868810b9c46d7789daaf79b72602fb57b58cd96dce4a64d9773c29793c86c6660ea3c3ecb588719d0bd7903d419ba55ab7bf252eb3237f87767b09f8fb3c1def671eaa827322f0de0b5e52f2ac1fb19", 0xb2}, {&(0x7f00000069c0)="7484d65a34e4ebb5731f4d6a27b67ee9a2b24c37499482ebd2abb741b4abe5f482aa3021f25fc341917b84dce874df83481b70", 0x33}, {&(0x7f0000006a00)="a52afce56cc59f4b056ef1", 0xb}, {&(0x7f0000006a40)="60bfb2e6a37fdc373a9186dcfadaa02cd1290f4ca3c521e6ed3cb37e81e3a62b0aec4e0126b42c295763353b8ba9bf092a8a4f7656dc6e69e32e53f0682fc7d9fc9264c537d4e9afd11166bc55e4f838b32e6748d1f89699c8cc31e169c04d0e87023c0b5bf7ae9cad", 0x69}, {&(0x7f0000006ac0)="e95fe6d413ac75af26f2c738f5c3516d8ef4035ecb744b9b6921fab63abc168512e2381a3ecbb35fac12cc354745258ea2c0f6a762f2703d9be2e0a5ab4ce7096639fa013f732359d78765a4677490ad853a61a8086f3f0d9bfbe08bf14b51f7ce27ac645198c001bb68553177ee998a19ec288a1162049f080ee28ad8042cf302aa7784852c73893cc729d63a70087ad580e6e61c14090b6a866176311b3115fe2949b43b8652d596423b5cde56c8c5d80edc91550dde94bbb73ada4791e27bd9b55321bbe442ef3f270b5a47d3dcabe94748fec29eb0810535591786faf72ad2fc43123dd5dfd13a397f3bf9e1a1ae6e", 0xf1}, {&(0x7f0000006bc0)="1c0d60e098831db7a0e6859ab500cb3abb4d", 0x12}], 0x9}}, {{&(0x7f0000006cc0)=@caif, 0x80, &(0x7f0000006fc0)=[{&(0x7f00000078c0)="ddb3ebd927ffdbbf9714123892b53ef275e057e3c2d7597103ba4df50432ec99cf023b5a7233875df02c1b41064c42e8e28d8c9d14031b8158e4398004c4925cfa5b7d7f84745d02295056b4dcd0f59c4acb11d945b267da7ffb2b96064a19e7d4b3cdf9fcc55b579584d4bb9162963a73e0068e553cb2e3a6af806f2b782bd8567274425bcfdc087321c8373553f67edf35e26ffceddd1219f08908cdab5bb0a208aff3c6d1f938362b827b475a4ea59ad4847d98263bc6f4e3ac62135d3f6a7724462525d8f9b14072f9ee852c85642609d645807f", 0xd6}, {&(0x7f0000006e40)="c303f4cf275625c65a16340968c9ac6671fbf8628c68e89dd165a3d2f0bb82501770b9cd7fbe9c880f372c3c2c5903a5ba6a0bf45364077d5b2bd527094e48b237942d80cbcf46709dbd15647775329b067ef566e6a6a7213cba5376269d9146ec6a1f066aee417dc83a", 0x6a}, {&(0x7f0000006ec0)="7b585587c6e40d372daba82f9c149f500e76780680e71aa6b67bbbe030912bfa2483f5f0884c772e3d84904d2add4e914ed0fc79b266521dd02bc90dce0bc5af24086a62b91b01b6f0cd994c1ad635cb0d77ea53c774841c5d5db7da3621e21f47b59a7e95f07c5d59e0ea04b0b86306df943416b774c698521ccc4739d5165828f62e4a142451ace85957a0af57882a7701bf22fcd1f2b120880f9d8e5c72f309639b949a3e64d7a12ca5ac40334813733433c8e82d1394a26712e685a02925c551c48c734e0f964596ab65a08d3a1ac115bbdf94b29cd6cf3d", 0xda}], 0x3, &(0x7f0000007000)=[{0x18, 0x0, 0x1ff, '\\'}, {0x100, 0x114, 0xfffff576, "5e1079a3654ff82955f8d7cac5286301a7185d4cd8db57fce9ba14dc733f67cb92d2e3ab746a5761c14f19e14e22167cd56c942ea7b9589007b9bb9807281b01b620b265e831ecb4a802518a496eb6983fb69f2d0567403e4c0d143486a3bf67439fd25b26e92ed9504d655b24d3cb38167957b83559ba9540217005f03272c172f9a3acfcddf66bcae05e905facbdbee07f27d09a41359b71b0bd7b0206a6867c853ecccbe30a266432eb23875a3225e93000bdf10c8a4950062254249d67e9c087433455a00704424ca95fb5432f87623a3d3c96631ec765ebba3571ef86ab4f00bdbbf18bc56534cb0188b4ce1ade"}, {0x50, 0x119, 0x8, "635173b2610258813c13a5eca5e87ec05fec63ee7f915847ae4a080921e8e4d749ee3b7ef6e3bf44a16d8305178456ed60ce467e33ba2f99503ed74a"}], 0x168}}, {{&(0x7f0000007180)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x101, 0x4, 0x1, 0x3, {0xa, 0x4e20, 0x7, @empty, 0x5}}}, 0x80, &(0x7f0000007600)=[{&(0x7f0000007200)="4702f83b897fe8c6c56bdc0bee72ef913538e9c685b4bac416608e3caaa0fef789f0d6d92c88b99bddd842c5ffda8f0b49349ea506e5bf791a1f341e075d774a1f8ae7a218d633db1c3feafcde4e8346e7daf313efaa9005a0a1ea151ac442a07147e50e040de4d780c0172a0ac8da7e0784756c7977ef5c1a054a95403393a9575e6a4813efdc358a248485c1ccffaa4a93d5ee89f07045d8f7ebb11738a38427e953d834b85cb2f427d590011433c05994d0a93246ae369cd5618a8e8c2856ef060d104032456ba84063f81b098a6c5621bbbe04fa5a3e78c0e4507dff5704aa95cc6c7132c780a24adf1beded", 0xee}, {&(0x7f0000007300)}, {&(0x7f0000007340)="65fc0b28050e66586a1d39e5cd0c43c0f0dad5ce81d5db63", 0x18}, {&(0x7f0000007380)="789abc6d509d4acf02a8148ef287c3df83c0dcf241568d6e755c1e88a93e60c0b15c7221c38dd58b0a262747f85e3e912f394e9bdee452f2d4aea1c2f4864bfc49a64573167b682398374013b634f5c7dbff1d34aea92fcc000b91d35cd68dbee64c6d25dc79cfee4267e06dd4e8ea48014fa1c5ab07eb27add71c0bf01cbdb8d2762341746f7722c859127eb6aaaafc00683ca06038daf69399fd95529bd7bfe7b97d8a5bdd77050612aa6b0518634e70fceff8ee709832696b0dc5e736de8ce612e091d37674fd46", 0xc9}, {&(0x7f0000007480)="7dd73e4580b4e838b925e637bd8fec", 0xf}, {&(0x7f00000074c0)="d58194184f827254eff2276d05385ead4634c06c09b05f014ad35517408d5d3b2a61da5250125b4446c7369dc8540f1e65dd19b77106feb14d54d1541d9131d3d3dfbcb4ac9910115cc7c337741c18abe7be", 0x52}, {&(0x7f0000007540)="adc9d6df10d4481b90bc19e6bfc597a2428cfa9ff75570aa0c73eb1b39444c9f80fd95632fe904134c01292386fc13e8e3ba6363f3e2619ace7efcd58448d723475264326acb1baaa66daf77f69135ed47cb91c66442cc0b3b134d9308d85c5dc5594ba2533e07440e5d052df1e4da5b4f8f0ac8e097348312af17de", 0x7c}, {&(0x7f00000075c0)="9e8b8e68c14e85c629d476cdf2e255f4725c726560f44c6eb5a3051aca88e4447c29a5c353aa886b78e2d04ad7e9", 0x2e}], 0x8}}], 0x9, 0x40040) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001840)='/selinux/status\x00', 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r7 = dup3(r6, r5, 0x80000) getsockopt$TIPC_DEST_DROPPABLE(r7, 0x10f, 0x81, &(0x7f0000006180), &(0x7f0000006d40)=0x4) ioctl$EVIOCGLED(r5, 0x80404519, &(0x7f0000000280)=""/204) getsockopt$inet6_tcp_buf(r3, 0x6, 0xb, &(0x7f0000001880)=""/134, &(0x7f0000001940)=0x86) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30, 0x5, 0x0, {0x0, 0x0, 0x2, 0x9}}, 0x30) [ 350.306501][T30774] limit_mt_check: 33 callbacks suppressed [ 350.306507][T30774] xt_limit: Overflow, try lower: 620756992/18944 08:54:22 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x6, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 350.403501][T30775] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000006000000, [ 350.407778][T30789] xt_limit: Overflow, try lower: 620756992/18944 [ 350.467346][T30795] xt_limit: Overflow, try lower: 620756992/18944 [ 350.475860][T30795] xt_limit: Overflow, try lower: 620756992/18944 [ 350.550727][T30782] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x00000000000000c0, [ 350.566479][T30758] xt_limit: Overflow, try lower: 620756992/18944 [ 350.571784][T30808] xt_limit: Overflow, try lower: 620756992/18944 [ 350.580818][T30805] EXT4-fs (sda1): re-mounted. Opts: auto_da_alloc=0x0000000006000000, [ 350.590658][T30812] xt_limit: Overflow, try lower: 620756992/18944 08:54:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:22 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)=ANY=[@ANYBLOB='npquota,\x00']) [ 350.599018][T30812] xt_limit: Overflow, try lower: 620756992/18944 08:54:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 350.630918][T30817] xt_limit: Overflow, try lower: 620756992/18944 08:54:22 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7000000}}]}) 08:54:22 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:22 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCGETX(r2, 0x5432, &(0x7f0000000600)) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000c8020000580100000000000058010000000000000000004c300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0005801000000000000000000000000000000000000000048006c696d69740000000000000000000000000000000000000000000000000000000025004a00000000000000000000000000000000000000000000000000000000000000000000380074696d65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000020000000000000000000000007070747000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000004000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000000000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000"], 0x328) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000240)={@rand_addr, @multicast1, @multicast1}, &(0x7f0000000280)=0xc) mount(&(0x7f0000000680)=ANY=[@ANYBLOB="2f6465762f6ebaf5c73a046c61bbc015756c6c623000"], &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='msdos\x00', 0x1b001, &(0x7f00000001c0)='\x00') chdir(&(0x7f0000000200)='./file0\x00') ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f0000000640)) [ 350.786404][T30822] EXT4-fs (sda1): Unrecognized mount option "npquota" or missing value 08:54:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 350.830839][T30839] xt_limit: Overflow, try lower: 620756992/18944 08:54:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:22 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="2e42deb6eb8634b3760285a1050025696c4530"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r1 = dup(r0) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000200)=0x2, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc0}}]}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x2, &(0x7f0000000040)=[{0xa33, 0xcf, 0x1, 0x2a34}, {0x800, 0x9, 0x4, 0xc6}]}, 0x10) 08:54:22 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:22 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="2e2f66696c6530002577aaab3c7d175c410139706bbf4993ee2d86d616500da8926ceb5b67b9ee01f4f1938034667a83c578b3236b"], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:23 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x1, 0x9, 0x2}) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f00000001c0)={[{@usrjquota_path={'usrjquota', 0x3d, './file0'}}, {@nobarrier='nobarrier'}, {@jqfmt_vfsv1='jqfmt=vfsv1'}, {@noblock_validity='noblock_validity'}, {@bsddf='bsddf'}]}) 08:54:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:23 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x8000000}}]}) 08:54:23 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB="012f66696c6530"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='auto_da_alloc=000000c0,\x00']) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x4c, 0x8, 0x6, 0x5, 0x0, 0x0, {0x5, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000800}, 0x4000) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000240)='net/anycast6\x00') r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f00000002c0)={0x1, 0x3, 0xfdf, 0xffff}, 0x10) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000280)=0x2, 0x4) 08:54:23 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:23 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000180)='./file0\x00', 0x150) getgid() mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) setrlimit(0xd, &(0x7f00000000c0)={0x4}) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:23 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x9000000}}]}) 08:54:23 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6e6f757365725f78617474722c7375626a5f757350723d2f02006f646501000000696e75782a24000076626f786e657430656d31776c616e312c00b6ad6fb26c8d4ce8d0130f2e4834cce20e051ce27e87344c2a67decdf3541e403f33477a511b096519edb74b269017c9035c6d43067f42a0a3e413dc160853"]) 08:54:23 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000000c0)=[0x0]) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) setresgid(r3, r1, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r0, r3) setfsgid(r3) 08:54:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:23 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38228b8, &(0x7f0000000040)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x645}}, {@dax='dax'}]}) 08:54:23 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000f2cff4)={0x77540947ad9a168d}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r3, 0xc00c55ca, &(0x7f0000000240)={0x9, 0xffff, 0x4}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000600)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000200000003000000c8020000580100000000000058010000000000000000004c300200003002000030020000300200003002000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0005801000000000000000000000000000000000000000048006c696d69740000000000000000000000000000000000000000000000000000000025004a00000000000000000000000000000000000000000000000000000000000000000000380074696d65000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000000020000000000000000000000007070747000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006124677b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000d80000000000000000000000000000000000000000006800435400000000000000000000000000000000000000000000000000000001000000000000000000000000736e6d705f747261700000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000004feffffff00000000"], 0x328) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r4, &(0x7f00000000c0)={0x2000}) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$UHID_SET_REPORT_REPLY(r6, &(0x7f0000000180)=ANY=[@ANYBLOB="0e000000040000008180ad00a8fe4ae55fdd61504bc88c881f8205fb82fd0e9a0777deb7cfca5bb736017e02575626d0c6de185238469d36c153978c8593247fe918f3112d75fd9d4ca41a590f47eff2e3e465bab70715808f5c38db31cbe42dce05dab5f60c37345e881b043a25126b7d13e45a292992f011248a9a973715af0889a3aaa84f5504e62c66209c4309ae8b9df78ec878328721d30f7ab0290eda27a5be5f2ccf7a8af4fd06b8b57589eb02dc47292875d09496"], 0xb9) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:23 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b84f6, 0x0) 08:54:23 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xa000000}}]}) 08:54:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:24 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) r0 = socket$key(0xf, 0x3, 0x2) accept(r0, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRES64], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) 08:54:24 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x884200, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000340)=""/78) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f00000000c0)) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x810099, &(0x7f0000000200)={[{@barrier='barrier'}]}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RWRITE(r5, &(0x7f0000000100)={0xb, 0x77, 0xfffe, 0x7ab}, 0xb) 08:54:24 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b84f6, 0x0) 08:54:24 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38228b8, &(0x7f0000000040)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x645}}, {@dax='dax'}]}) 08:54:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:24 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xb000000}}]}) 08:54:24 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b84f6, 0x0) 08:54:24 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38228b8, &(0x7f0000000040)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x645}}, {@dax='dax'}]}) 08:54:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:24 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2e2f66696c5214d1"], &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:24 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000040)=0x7fff) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, 0x17, 0xa, 0x101, 0x0, 0x0, {0xc, 0x0, 0x1}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x4}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 08:54:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:24 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[]) 08:54:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:25 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x80000000000000, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@noquota='noquota'}]}) 08:54:25 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38228b8, &(0x7f0000000040)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x645}}, {@dax='dax'}]}) 08:54:25 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xc000000}}]}) 08:54:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:25 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[]) 08:54:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:25 executing program 3: mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x50, 0xffffffffffffffff, 0x10000000) mount(&(0x7f0000001340)=ANY=[@ANYBLOB="2e2f61cc9200ea"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f00000002c0)=ANY=[@ANYBLOB="01f86f15248bccd2456b280200000088ad008872110f3fa3efb732e6713430527f3a31a2d715760603116e71d56807ae27a243e593617abac5241b9ea12d5146e67b57c48af9023bee785d4ea5a54611258b0438d921dbb8e1a992ce9359927af5d2397d0005ce2c4527297d622d5cc4a10147c25eb10269ec855c48e7273cce4807b45760525626f1ffcce44839f7ea79cebceccf7088d2f3fa5020cf415670434d3115b580b8d3973fc123aeb456e873000000809097faa60c0f0f28fa05f0f772afa8ff2de5c2c41db42f977bac097dbdcc3cf00a1d285805de074fc0bd"]) 08:54:25 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38228b8, &(0x7f0000000040)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x645}}, {@dax='dax'}]}) 08:54:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:25 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[]) 08:54:25 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xd000000}}]}) 08:54:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:25 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x204643, 0x0) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000006a23b96de49025e98ffc372374ec6e1114585ec7c7eb83fd9bc1f5cb4f8f5227925b1754e9a8c519a3e94642daab00536e7a36e3b246fee8848d106647e675ff5b88bfc0cca6793f7650a528c9c524aba26762e5eeeee4b825b61509f0ce6136c107c4c316a6e9e3bba091cf558d21007ddaaa0ce61bf27df0a308803ac7c3616239"], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f00000001c0)=0x6) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)) 08:54:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:25 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB]) 08:54:25 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38228b8, &(0x7f0000000040)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x645}}, {@dax='dax'}]}) 08:54:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:26 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xe000000}}]}) 08:54:26 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38228b8, &(0x7f0000000040)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x645}}, {@dax='dax'}]}) 08:54:26 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB]) 08:54:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:26 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000040)=ANY=[@ANYBLOB="8771eb86b7d9074d685c7781575348cc471b10254cfbb06bfd4f3fe1413c3461c934eb54a7"]) 08:54:26 executing program 2: mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38228b8, &(0x7f0000000040)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x645}}, {@dax='dax'}]}) 08:54:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:26 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1001004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32b84f6, &(0x7f0000000200)=ANY=[@ANYBLOB]) 08:54:26 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1081004, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x32f84f6, &(0x7f0000000100)) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000200)=0x4) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000280)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x64, r1, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @dev={0xfe, 0x80, [], 0x37}}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004091}, 0x4000000) r2 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x4a2801, 0x100) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet(0x2, 0x3, 0x7f) splice(r3, 0x0, r5, 0x0, 0x8000, 0x0) r6 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') r7 = socket$key(0xf, 0x3, 0x2) getsockname(r7, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000600)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001a40)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000001a80)={@multicast2, @loopback}, &(0x7f0000001ac0)=0xc) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000001f40)={'veth0\x00', 0x0}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = socket$inet(0x2, 0x3, 0x7f) splice(r12, 0x0, r14, 0x0, 0x8000, 0x0) r15 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') r16 = socket$key(0xf, 0x3, 0x2) getsockname(r16, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r16, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001900)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000001a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r12, 0x8933, &(0x7f0000001a40)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r13, 0x0, 0x24, &(0x7f0000001a80)={@multicast2, @loopback, 0x0}, &(0x7f0000001ac0)=0xc) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000001f40)={'veth0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r13, &(0x7f00000021c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002180)={&(0x7f0000001f80)={0x1e8, r15, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r17}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r18}}}]}}, {{0x8, 0x1, r19}, {0x184, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r20}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0xa1c, 0x5, 0x1, 0x6}, {0x0, 0xff, 0x0, 0x8}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xffff}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x4008091}, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f00000021c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000002180)={&(0x7f0000000940)={0x1f8, r15, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}, {0x0, 0x1, @lb_hash_stats={{{0x0, 0x1, 'lb_hash_stats\x00'}, {}, {0x0, 0x4, 0x5c0e}}}}, {0x0, 0x1, @name={{0x0, 0x1, 'mode\x00'}, {}, {0x0, 0x4, 'roundrobin\x00'}}}]}}, {{0x8, 0x1, r10}, {0x194, 0x2, 0x0, 0x1, [{0x40, 0x1, @mcast_rejoin_count={{0x0, 0x1, 'mcast_rejoin_count\x00'}, {}, {0x0, 0x4, 0x1}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0xa1c, 0x5, 0x1, 0x6}, {0x0, 0xff, 0x0, 0x8}, {0xff, 0x8, 0x11, 0x1}, {0x2, 0x81, 0xd7, 0x6}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x31}, {0x8, 0x4, 0xffff}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}]}}]}, 0x1f8}, 0x1, 0x0, 0x0, 0x4008091}, 0x10) r22 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f00000003c0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r25 = dup(r24) getsockname$packet(r25, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], r26}, 0x3c) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@empty, 0x4e23, 0x81, 0x4e24, 0x6, 0x0, 0x80, 0x20, 0x32, r26, r23}, {0xffffffff80000001, 0x174, 0x4, 0xffffffff, 0xbb00000000000000, 0x5, 0x1000, 0xfffffffffffffff8}, {0x1000, 0x400, 0xea, 0x2}, 0x3, 0x6e6bb9, 0x0, 0x1, 0x2, 0x3}, {{@in6=@mcast1, 0x4d3, 0x33}, 0xa, @in6=@local, 0x3502, 0x0, 0x2, 0x6, 0x4, 0x9, 0x7f}}, 0xe8) accept4$packet(r0, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14, 0x800) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f00000005c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)=ANY=[@ANYBLOB="a4000000", @ANYRES16=r6, @ANYBLOB="000127bd7000fedbdf250000004eb4dac82a", @ANYRES32=r26, @ANYBLOB="3c00028038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400f60f000008000100", @ANYRES32=r27, @ANYBLOB="4400028040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b00000008000400008000000800070000000000"], 0xa4}}, 0x0) 08:54:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:26 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x10000000}}]}) 08:54:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) 08:54:26 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x204c2, 0x0) mount(&(0x7f0000001340)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000180)='./file0\x00', 0x0, 0x30c5004, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x38028b8, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00']) [ 354.663713][T31292] kasan: CONFIG_KASAN_INLINE enabled [ 354.670105][T31292] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 354.679645][T31292] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 354.687142][T31292] CPU: 1 PID: 31292 Comm: udevd Not tainted 5.4.17-syzkaller-00005-g2303d908db80 #0 [ 354.696681][T31292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.706750][T31292] RIP: 0010:path_openat+0x324/0x3c00 [ 354.712033][T31292] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00 [ 354.732373][T31292] RSP: 0018:ffff88819c98f4c0 EFLAGS: 00010247 [ 354.739049][T31292] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88819c98f6e8 [ 354.747160][T31292] RDX: ffff8881cf6c8a18 RSI: 0000000000000000 RDI: 0000000000000004 [ 354.755132][T31292] RBP: ffff88819c98f790 R08: ffffffff81782ec1 R09: 0000000000000003 [ 354.763103][T31292] R10: ffffed1033931e4b R11: 0000000000000004 R12: ffff88819c98f7e8 [ 354.771153][T31292] R13: ffff8881cedc4900 R14: ffff88819c98f9f0 R15: dffffc0000000000 [ 354.779709][T31292] FS: 00007f0a7c39e7a0(0000) GS:ffff8881dbb00000(0000) knlGS:0000000000000000 [ 354.789962][T31292] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 354.796565][T31292] CR2: 00000000004fdc0c CR3: 00000001d2818003 CR4: 00000000001606e0 [ 354.804531][T31292] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 354.812605][T31292] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 354.820576][T31292] Call Trace: [ 354.824049][T31292] ? stack_trace_save+0x1e0/0x1e0 [ 354.829064][T31292] ? is_bpf_text_address+0x2c8/0x2e0 [ 354.835061][T31292] ? stack_trace_save+0x1e0/0x1e0 [ 354.840563][T31292] ? do_filp_open+0x430/0x430 [ 354.845412][T31292] ? stack_trace_save+0x111/0x1e0 [ 354.851135][T31292] ? stack_trace_snprint+0x150/0x150 [ 354.856404][T31292] do_filp_open+0x1f7/0x430 [ 354.860907][T31292] ? vfs_tmpfile+0x230/0x230 [ 354.865657][T31292] ? load_elf_binary+0x1abd/0x3720 [ 354.870809][T31292] ? memset+0x31/0x40 [ 354.874785][T31292] ? __kasan_check_write+0x14/0x20 [ 354.879977][T31292] ? _raw_spin_lock+0xa1/0x170 [ 354.885186][T31292] ? _raw_spin_trylock_bh+0x190/0x190 [ 354.890828][T31292] do_open_execat+0x178/0x860 [ 354.895587][T31292] ? _raw_spin_unlock+0x9/0x20 [ 354.900942][T31292] ? ___slab_alloc+0x2a0/0x450 [ 354.905857][T31292] ? open_exec+0x60/0x60 [ 354.910093][T31292] ? getname_kernel+0x59/0x2f0 [ 354.914956][T31292] ? getname_kernel+0x15d/0x2f0 [ 354.919793][T31292] ? memcpy+0x49/0x60 [ 354.923901][T31292] ? getname_kernel+0x214/0x2f0 [ 354.929208][T31292] open_exec+0x3d/0x60 [ 354.933448][T31292] load_elf_binary+0x1abd/0x3720 [ 354.938376][T31292] ? populate_vma_page_range+0x100/0x100 [ 354.943993][T31292] ? __kasan_check_write+0x14/0x20 [ 354.949120][T31292] ? _raw_read_unlock+0x12/0x30 [ 354.954081][T31292] ? load_script+0x184/0x970 [ 354.958658][T31292] ? bm_evict_inode+0xd0/0xd0 [ 354.963406][T31292] ? copy_strings+0x7e4/0x900 [ 354.968071][T31292] ? load_script+0x970/0x970 [ 354.972748][T31292] search_binary_handler+0x190/0x5e0 [ 354.978406][T31292] __do_execve_file+0x12a2/0x1c00 [ 354.983629][T31292] ? do_execve_file+0x40/0x40 [ 354.988301][T31292] ? getname_flags+0x214/0x640 [ 354.993610][T31292] __x64_sys_execve+0x94/0xb0 [ 354.998460][T31292] do_syscall_64+0xc0/0x100 [ 355.003037][T31292] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 355.008943][T31292] RIP: 0033:0x7f0a7ba82207 [ 355.013341][T31292] Code: 77 19 f4 48 89 d7 44 89 c0 0f 05 48 3d 00 f0 ff ff 76 e0 f7 d8 64 41 89 01 eb d8 f7 d8 64 41 89 01 eb df b8 3b 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 02 f3 c3 48 8b 15 00 8c 2d 00 f7 d8 64 89 02 [ 355.033166][T31292] RSP: 002b:00007ffdfc0df788 EFLAGS: 00000206 ORIG_RAX: 000000000000003b [ 355.045277][T31292] RAX: ffffffffffffffda RBX: 00000000ffffffff RCX: 00007f0a7ba82207 [ 355.053431][T31292] RDX: 00000000013bd1f0 RSI: 00007ffdfc0df880 RDI: 00007ffdfc0e0890 08:54:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x2c8, 0x158, 0x0, 0x158, 0x0, 0x4c000000, 0x230, 0x230, 0x230, 0x230, 0x230, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@unspec=@limit={{0x48, 'limit\x00'}, {0x25000000, 0x4a00}}, @common=@unspec=@time={{0x38, 'time\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], 0x0, 0x70, 0xd8}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x328) [ 355.061733][T31292] RBP: 0000000000625500 R08: 0000000000001148 R09: 0000000000001148 [ 355.070105][T31292] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000013bd1f0 [ 355.078248][T31292] R13: 0000000000000007 R14: 0000000001375030 R15: 0000000000000005 [ 355.086434][T31292] Modules linked in: [ 355.092278][T31292] ---[ end trace e1659fe83e400099 ]--- [ 355.097975][T31292] RIP: 0010:path_openat+0x324/0x3c00 [ 355.103414][T31292] Code: 48 89 84 24 00 01 00 00 42 80 3c 38 00 74 08 48 89 df e8 5f ac f8 ff 48 89 5c 24 38 48 8b 1b 48 8d 7b 04 48 89 f8 48 c1 e8 03 <42> 8a 04 38 84 c0 0f 85 4b 24 00 00 8b 43 04 89 84 24 08 01 00 00 [ 355.123665][T31292] RSP: 0018:ffff88819c98f4c0 EFLAGS: 00010247 [ 355.130353][T31292] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff88819c98f6e8 [ 355.138899][T31292] RDX: ffff8881cf6c8a18 RSI: 0000000000000000 RDI: 0000000000000004 [ 355.147123][T31292] RBP: ffff88819c98f790 R08: ffffffff81782ec1 R09: 0000000000000003 [ 355.155395][T31292] R10: ffffed1033931e4b R11: 0000000000000004 R12: ffff88819c98f7e8 [ 355.164170][T31292] R13: ffff8881cedc4900 R14: ffff88819c98f9f0 R15: dffffc0000000000 [ 355.174240][T31292] FS: 00007f0a7c39e7a0(0000) GS:ffff8881dbb00000(0000) knlGS:0000000000000000 [ 355.185112][T31292] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 355.192055][T31292] CR2: 00000000004fdc0c CR3: 00000001d2818003 CR4: 00000000001606e0 [ 355.200344][T31292] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 355.208553][T31292] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 355.216750][T31292] Kernel panic - not syncing: Fatal exception [ 355.223786][T31292] Kernel Offset: disabled [ 355.228233][T31292] Rebooting in 86400 seconds..