40, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0x0, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 16:59:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2939.772030][T28424] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2939.780034][T28434] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2939.804442][T21677] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 16:59:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2939.807582][T28424] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2939.813851][T28434] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2939.856051][T28441] loop0: detected capacity change from 0 to 512 [ 2939.861298][T28439] loop2: detected capacity change from 0 to 512 16:59:59 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0x0, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2939.872650][T22625] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2939.883025][T28443] loop3: detected capacity change from 0 to 512 [ 2939.891009][T28441] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2939.899051][T28439] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2939.899339][T28434] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2939.917706][T28443] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2939.927475][T28441] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2939.942021][T28434] ext4_test_bit(bit=14, block=4) = 1 [ 2939.947306][T28434] is_bad_inode(inode)=0 [ 2939.951482][T28434] NEXT_ORPHAN(inode)=0 [ 2939.955534][T28434] max_ino=32 [ 2939.958720][T28434] i_nlink=1 16:59:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2939.963567][T28434] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2939.966134][T28441] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2939.976654][T28443] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2939.984286][T28441] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2940.004607][T28439] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2940.004800][T28439] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 16:59:59 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0x0, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 16:59:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2940.026183][T28443] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2940.053220][T28453] loop4: detected capacity change from 0 to 512 [ 2940.061702][T28443] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) 16:59:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2940.062122][T21677] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2940.074018][T28439] ext4_test_bit(bit=14, block=4) = 1 [ 2940.088168][T28439] is_bad_inode(inode)=0 [ 2940.092338][T28439] NEXT_ORPHAN(inode)=0 [ 2940.092502][T28453] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2940.096396][T28439] max_ino=32 [ 2940.096403][T28439] i_nlink=1 [ 2940.096582][T28443] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. 16:59:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 16:59:59 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0x0, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2940.108139][T28439] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2940.111446][T18969] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2940.143779][T28457] loop0: detected capacity change from 0 to 512 16:59:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2940.167200][T23276] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2940.180439][T28453] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2940.181709][T28460] loop5: detected capacity change from 0 to 512 [ 2940.192959][T28457] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2940.201741][T28460] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2940.209891][T28453] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2940.211931][T21634] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2940.235568][T28457] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2940.250607][T28453] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) 17:00:00 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2940.250843][T28460] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2940.265163][T28453] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2940.282959][T28465] loop3: detected capacity change from 0 to 512 [ 2940.303649][T28465] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2940.306690][T28457] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2940.312841][T28460] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2940.320047][T28457] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2940.336307][T28460] ext4_test_bit(bit=14, block=4) = 1 [ 2940.348121][T28460] is_bad_inode(inode)=0 [ 2940.352323][T28460] NEXT_ORPHAN(inode)=0 [ 2940.355255][T28470] loop2: detected capacity change from 0 to 512 [ 2940.356367][T28460] max_ino=32 17:00:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:00 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2940.356374][T28460] i_nlink=1 [ 2940.362327][T28465] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2940.370239][T28460] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2940.391195][T28470] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2940.400229][T22625] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2940.410403][T28470] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 17:00:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2940.419361][T28465] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2940.434251][T28470] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2940.448242][T21677] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 17:00:00 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2940.461467][T28465] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2940.474037][T28470] ext4_test_bit(bit=14, block=4) = 1 [ 2940.479429][T28470] is_bad_inode(inode)=0 [ 2940.483574][T28470] NEXT_ORPHAN(inode)=0 [ 2940.487636][T28470] max_ino=32 [ 2940.490283][T28479] loop4: detected capacity change from 0 to 512 [ 2940.490848][T28470] i_nlink=1 [ 2940.504151][T28479] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem 17:00:00 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2940.514713][T28470] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2940.537794][T28482] loop0: detected capacity change from 0 to 512 [ 2940.542206][T18969] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2940.549013][T28482] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2940.554003][T28479] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 17:00:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2940.562904][T28465] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2940.573994][T28479] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2940.596332][T28479] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2940.609238][T28479] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2940.624213][T21634] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2940.635818][T28487] loop5: detected capacity change from 0 to 512 [ 2940.646239][T28482] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2940.657332][T28487] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 17:00:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:00 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBvHTt9k1DKo6UVgYKIeCRN+qAHLiCQOICEBIciTiFJq1C3QU2QaBVB4BCOqBJ3xBGJv4AL5YKAExJXuCOkCOXSwslo7d3UTewkTpy41L+ftO3M7kQz3+6OPTtjO4CuNZD+k0Tsj4jfI6Kvlr2zwEDtv1tLc+P/LM2NJ1GpvPV3Ui13c2luPC+a/92+WqZSzPK7GtS78G7EWLk8eSXLD89e+mB45uq156cujV2YvDB5efTs2VMnj/WeGT3dljjTuG4e+Xj66OHX3rn+xvi56+/9/G3a3v3Z8fo42mWgdnYbeqrdlXXYgbp0UuxgQ2hJet3Sy1Wq9v++6Ik9y8f64tXPOto4YFtVKoVKo/fnzHwFuIelo3mgG+Vv9Onzb77t0NDjrrD4Uu0BKI37VrbVjhSjkJUprXi+baeBiDg3/+9X6RbbNA8BAFDvRjr+ea7R+K8QD9WVuy9bQ+mPiPsj4mBEPBARhyLiwYhq2Ycj4pEW61+5QrJ6/FPp21RgG5SO/17M1rbuHP/lo7/o78lyB6rxl5LzU+XJE9k5GYzSrjQ/skYdP7zy2xfNjtWP/9ItrT8fC2bt+Ku4YoJuYmx2bCsx11v8NOJIsVH8SeTLOElEHI6II5usY+qZb442O7Z+/GtowzpT5euIp2vXfz5WxJ9Lmq5PjrxwZvT08O4oT54Yzu+K1X75deHNZvVvKf42WLxRib0N7//l+PuT3REzV69drK7XzrRex8Ifnzd9ptns/d+bvF1N92b7Phqbnb0yEtGbvL56/+jtv83zefn0/h883rj/H4zbZ+LRiEhv4mPZvseytj8eEU9ExPE14v/p5Sffbz3+NWbl2yiNf2K96x/117/1RM/FH79rPf5cev1PVVOD2Z6NvP5ttIFbOXcAAADwf1GofgY+KQwtpwuFoaHaZ/gPxd5CeXpm9tnz0x9enqh9Vr4/SoV8pquvbj50JJsbzvOjK/Ins3njL3v2VPND49PliU4HD11uX5P+n/qzp9OtA7ad72tB99L/oXvp/9C99H/oXvo/dK9G/f+TDrQD2HnrvP/v2al2ADvP+B+6l/4P3Uv/h67U9LvxhS195V+iQ4nve7f2Ww0bT0ThLgn5nkmUouGh4oZ/zGKTiV0ND3X6lQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKA9/gsAAP//RbfiGg==") [ 2940.668634][T28482] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2940.677262][T28482] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 2940.708483][T23276] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 2940.709060][T28487] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2940.720876][T28492] loop2: detected capacity change from 0 to 512 [ 2940.733321][T28492] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2940.734187][T28487] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2940.774852][T28497] loop0: detected capacity change from 0 to 512 [ 2940.784826][T28487] ext4_test_bit(bit=14, block=4) = 1 [ 2940.790157][T28487] is_bad_inode(inode)=0 [ 2940.794398][T28487] NEXT_ORPHAN(inode)=0 [ 2940.795827][T28499] loop4: detected capacity change from 0 to 512 [ 2940.798445][T28487] max_ino=32 [ 2940.798453][T28487] i_nlink=1 [ 2940.809259][T28497] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem 17:00:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2940.820434][T28492] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2940.829711][T28492] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2940.841512][T28499] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2940.850386][T28497] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2940.851835][T28492] ext4_test_bit(bit=14, block=4) = 1 [ 2940.870259][T28492] is_bad_inode(inode)=0 17:00:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPDv+pG+f+mvlEdLC4GCiHgkTfqgBy4gkDiAhASHIk4hSatQt0FNkGgVQeAQjqgSd8QRib+AC+WCgBMSV7gjpAjl0sLJaO3dxk3sNE6cuNSfj7TJjHesme/ujj07YzuAnjWQ/kki9kbEbxHRX8/eXmCg/u/m0tz430tz40lUq2/+ldTK3ViaG8+L5s/bU89US1l+R5N6F96JGKtUJi9n+eHZi+8Pz1y5+tzUxbHzk+cnL42eOXPyxNG+06OnOhJnGteNwx9NHzn06tvXXh8/e+3dn75J27s3298YR6cM1I9uU092urIu29eQTkpdbAhtKUZEerrKtf7fH8XYdWtff7zyaVcbB2yparVQbfb+nJmvAvewdDQP9KL8jT69/823bRp63BUWX6zfAKVx38y2+p5SFLIy5RX3t500EBFn5//5Mt1ii+YhAAAaXU/HP882G/8V4oGGcv/L1lD2R8T/I+JARNwXEQcj4v6IWtkHI+KhNutfuUKyevxT7d9QYOuUjv9eyNa2bh//5aO/SIpZbl8t/nJybqoyeTw7JoNR3pHmR9ao4/uXf/281b7G8V+6pfXnY8GsHX+WVkzQTYzNjm0m5kaLn0QcLjWLP4l8GSeJiEMRcXiDdUw9/fWRVvvuHP8aOrDOVP0q4qn6+Z+PFfHnkpbrkyPPnx49NbwzKpPHh/OrYrWff1l4o1X9m4q/AxavV2N30+u/If6dETNXrl6ordfOtF/Hwu+ftbyn2ej135e8VUv3ZY99ODY7e3kkoi95bfXjo8vPzfN5+fT6HzzWvP8fiOUj8XBEpBfx0Yh4JCIezdr+WEQ8HhHH1oj/x5eeeK/9+NeYle+gNP6Jtc///jS1fP7bTxQv/PBt+/Hn0vN/spYazB5Zz+vfehu4mWMHAAAA/xWF2mfgk8LQrXShMDRU/wz/wdhdqEzPzD5zbvqDSxP1z8rvj3Ihn+nqb5gPHcnmhvP86Ir8iWze+Ivirlp+aHy6MtHt4KHH7WnR/1N/FLvdOmDL+b4W9C79H3qX/g+9S/+H3qX/Q+9q1v8/7kI7gO13h/f/XdvVDmD7Gf9D79L/oXfp/9CTWn43vrCpr/xLdCnxXd/mfqth/Yko3CUh3zOJcjTdVVr3j1lsMLGj6a5uvzIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB0xr8BAAD//2hI4g8=") 17:00:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBvHTt9k1DKo6UVgYKIeCRN+qAHLiCQOICEBIciTiFJq1C3QU2QaBVB4BCOqBJ3xBGJv4AL5YKAExJXuCOkCOXSwslo7d3UTewkTpy41L+ftMmMd6yZb3fHnp2xHUDXGkj/JBH7I+L3iOirZe8sMFD7d2tpbvyfpbnxJCqVt/5OquVuLs2N50Xz5+2rZSrFLL+rQb0L70aMlcuTV7L88OylD4Znrl57furS2IXJC5OXR8+ePXXyWO+Z0dNtiTON6+aRj6ePHn7tnetvjJ+7/t7P36bt3Z/tr4+jXQZqR7ehp9pdWYcdqEsnxQ42hJak5y09XaVq/++LntizvK8vXv2so40DtlWlUqg0en/OzFeAe1g6mge6Uf5Gn97/5tsODT3uCosv1W6A0rhvZVttTzEKWZnSivvbdhqIiHPz/36VbrFN8xAAAPVupOOf5xqN/wrxUF25+7I1lP6IuD8iDkbEAxFxKCIejKiWfTgiHmmx/pUrJKvHP5W+TQW2Qen478VsbevO8V8++ov+nix3oBp/KTk/VZ48kR2TwSjtSvMja9Txwyu/fdFsX/34L93S+vOxYNaOv4orJugmxmbHthJzvcVPI44UG8WfRL6Mk0TE4Yg4ssk6pp755mizfevHv4Y2rDNVvo54unb+52NF/Lmk6frkyAtnRk8P747y5Inh/KpY7ZdfF95sVv+W4m+DxRuV2Nvw+l+Ovz/ZHTFz9drF6nrtTOt1LPzxedN7ms1e/73J29V0b/bYR2Ozs1dGInqT11c/Pnr7uXk+L59e/4PHG/f/g3H7SDwaEelFfCzLP5a1/fGIeCIijq8R/08vP/l+6/GvMSvfRmn8E+ud/6g//60nei7++F3r8efS83+qmhrMHtnI699GG7iVYwcAAAD/F4XqZ+CTwtByulAYGqp9hv9Q7C2Up2dmnz0//eHlidpn5fujVMhnuvrq5kNHsrnhPD+6In8ymzf+smdPNT80Pl2e6HTw0OX2Nen/qT97Ot06YNv5vhZ0L/0fupf+D91L/4fupf9D92rU/z/pQDuAnbfO+/+enWoHsPOM/6F76f/QvfR/6EpNvxtf2NJX/iU6lPi+d2u/1bDxRBTukpDvmUQpGu4qbvjHLDaZ2NVwV6dfmQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANrjvwAAAP//Ir/iGw==") 17:00:00 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2940.873663][T28497] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2940.874396][T28492] NEXT_ORPHAN(inode)=0 [ 2940.874404][T28492] max_ino=32 [ 2940.889868][T28492] i_nlink=1 [ 2940.892527][T28499] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 17:00:00 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x0, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2940.928780][T28499] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2940.973875][T28499] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2940.977436][T28508] loop5: detected capacity change from 0 to 512 [ 2940.988360][T28513] loop3: detected capacity change from 0 to 512 [ 2940.993078][T28512] loop2: detected capacity change from 0 to 512 [ 2941.000617][T28513] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2941.009529][T28515] loop0: detected capacity change from 0 to 512 17:00:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2941.022774][T28508] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2941.033118][T28513] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2941.042207][T28515] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2941.047352][T28508] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2941.052830][T28513] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature 17:00:00 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x0, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2941.071621][T28513] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2941.073166][T28512] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2941.095111][T28515] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2941.110133][T28508] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2941.123098][T28515] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2941.144682][T28508] ext4_test_bit(bit=14, block=4) = 1 [ 2941.150107][T28508] is_bad_inode(inode)=0 [ 2941.154273][T28508] NEXT_ORPHAN(inode)=0 [ 2941.158395][T28508] max_ino=32 [ 2941.161689][T28508] i_nlink=1 [ 2941.165282][T28512] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 17:00:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:00 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x0, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2941.165446][T28523] loop4: detected capacity change from 0 to 512 [ 2941.181636][T28523] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2941.195844][T28525] loop3: detected capacity change from 0 to 512 [ 2941.210574][T28512] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 17:00:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2941.211275][T28528] loop0: detected capacity change from 0 to 512 [ 2941.230568][T28528] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2941.233485][T28525] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2941.239174][T28512] ext4_test_bit(bit=14, block=4) = 1 [ 2941.252289][T28512] is_bad_inode(inode)=0 [ 2941.256440][T28512] NEXT_ORPHAN(inode)=0 [ 2941.260615][T28512] max_ino=32 [ 2941.263805][T28512] i_nlink=1 17:00:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2941.268417][T28528] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2941.289523][T28528] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2941.298475][T28523] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2941.307599][T28535] loop5: detected capacity change from 0 to 512 [ 2941.318440][T28525] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2941.329373][T28523] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2941.344244][T28525] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2941.346610][T28535] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 17:00:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2941.357549][T28523] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2941.368107][T28535] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2941.402312][T28525] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) 17:00:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2941.435582][T28535] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2941.450364][T28544] loop2: detected capacity change from 0 to 512 [ 2941.454560][T28543] loop0: detected capacity change from 0 to 512 [ 2941.458135][T28544] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2941.468216][T28546] loop4: detected capacity change from 0 to 512 [ 2941.479571][T28535] ext4_test_bit(bit=14, block=4) = 1 17:00:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPCvX0nTxy/5lfJoaCFQEBGPpEkf9MAFBBIHkJDgUMQpJGkV6jaoCRKtIggcwhFV4o44IvEXcKFcEHBC4gp3hBShXFo4Ga2927iJncaJE5f685E2mfGONfPd3bFnZ2wH0LWGkj+5iP0R8VtE9NeytxcYqv27ubIw+ffKwmQuKpU3/8pVy91YWZjMimbP21fLVIppvrdBvUvvREyUy9OX0/zo/MX3R+euXH1u5uLE+enz05fGz5w5eeJoz+nxU22JM4nrxuBHs0cOv/r2tdcnz15796dvkvbuT/fXx9EuQ7Wj29CT7a6sww7UpXPFDjaElhQiIjldpWr/749C9N3a1x+vfNrRxgE7qlLJVxq9P6cWK8A9LBnNA90oe6NP7n+zbZeGHneF5RdrN0BJ3DfTrbanGPm0TGnN/W07DUXE2cV/vky22KF5CACAeteT8c+zjcZ/+Xigrtz/0jWUgYj4f0QcjIj7IuJQRNwfUS37YEQ81GL9a1dI1o9/Kv1bCmyTkvHfC+na1u3jv2z0F4VCmjtQjb+UOzdTnj6eHpPhKPUm+bEN6vj+5V8/b7avfvyXbEn92VgwbcefxTUTdFMT8xPbibne8icRg8VG8eciW8bJRcThiBjcYh0zT399pNm+O8e/gTasM1W+iniqdv4XY038mVzT9cmx50+PnxrdE+Xp46PZVbHez78svdGs/m3F3wbL1yuxt+H1Xxf/noi5K1cvVNdr51qvY+n3z5re02z1+u/JvVVN96SPfTgxP395LKIn99r6x8dXn5vls/LJ9T98rHH/PxirR+LhiEgu4qMR8UhEPJq2/bGIeDwijm0Q/48vPfFe6/FvMCvfRkn8Uxuf/4EktXr+W08ULvzwbevxZ5Lzf7KaGk4f2czr32YbuJ1jBwAAAP8V+epn4HP5kVvpfH5kpPYZ/kOxN1+enZt/5tzsB5emap+VH4hSPpvp6q+bDx1L54az/Pia/Il03viLQl81PzI5W57qdPDQ5fY16f+JPwqdbh2w43xfC7qX/g/dS/+H7qX/Q/fS/6F7Ner/H3egHcDuu8P7f99utQPYfcb/0L30f+he+j90pabfjc9v6yv/Eh1KfNezvd9q2Hwi8ndJyPdMohQNdxU3/WMWW0z0NtzV6VcmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA9vg3AAD//yp64hE=") [ 2941.482102][T28546] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2941.484917][T28535] is_bad_inode(inode)=0 [ 2941.494489][T28543] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2941.497207][T28535] NEXT_ORPHAN(inode)=0 [ 2941.497214][T28535] max_ino=32 [ 2941.497220][T28535] i_nlink=1 [ 2941.518966][T28543] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) 17:00:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2941.534887][T28543] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2941.539489][T28544] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2941.552468][T28546] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2941.565019][T28551] loop5: detected capacity change from 0 to 512 [ 2941.573635][T28551] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 17:00:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2941.589349][T28546] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2941.591156][T28551] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2941.616912][T28544] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2941.626474][T28551] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 17:00:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2941.627994][T28544] ext4_test_bit(bit=14, block=4) = 1 [ 2941.642999][T28544] is_bad_inode(inode)=0 [ 2941.647144][T28544] NEXT_ORPHAN(inode)=0 [ 2941.648225][T28546] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2941.651213][T28544] max_ino=32 [ 2941.651221][T28544] i_nlink=1 [ 2941.672672][T28551] ext4_test_bit(bit=14, block=4) = 1 [ 2941.678005][T28551] is_bad_inode(inode)=0 [ 2941.682182][T28551] NEXT_ORPHAN(inode)=0 [ 2941.686248][T28551] max_ino=32 17:00:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2941.686693][T28560] loop0: detected capacity change from 0 to 512 [ 2941.689448][T28551] i_nlink=1 [ 2941.698039][T28557] loop3: detected capacity change from 0 to 512 [ 2941.708146][T28557] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2941.716467][T28560] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem 17:00:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBv13b6JqGUR0sLgYKoeCRN+qAHLrwkDiAhwaGIU0jSqtRtUBMkWlVQOJQjqsQdcUTiL+BCuSDghMQV7gipQrm0cDJaezd1EzuNEycu9e8nbTLjWWvm292xZ2dsB9C3hrM/ScT2iPg9IgYb2Vt3GG78uzF/cfKf+YuTSdRqb/2d1Pe7Pn9xsti1eN62RqZWzvObWtR7+d2IiWp1+lyeH50788Ho7PkLz506M3Fy+uT02fFjxw4f2jdwdPxIV+LM4rq+5+OZvbtfe+fKG5PHr7z387dZe7fn5c1xdMtw4+i29GS3K+uxHU3ppNzDhtCRUkRkp6tS7/+DUYotC2WD8epnPW0csK5qtbTW6v05d6kG3MWy0TzQj4o3+uz+t9g2aOhxR7j2YuMGKIv7Rr41SsqR5vtUFt3fdtNwRBy/9O9X2RbrNA8BANDsajb+ebbV+C+NB5r2uydfQxmKiHsjYmdE3BcRuyLi/oj6vg9GxEMd1r94hWTp+Kc2uKrAVigb/72Qr23dOv4rRn8xVMpzO+rxV5ITp6rTB/NjciAqm7L82DJ1/PDKb1+0K2se/2VbVn8xFszb8Vd50QTd1MTcxFpibnbt04g95VbxJ1Es4yQRsTsi9qyyjlNPf7O3Xdnt419GF9aZal9HPNU4/5diUfyFpO365NjzR8ePjG6O6vTB0eKqWOqXXy+/2a7+NcXfBdeu1mJry+t/If6hZHPE7PkLp+vrtbOd13H5j8/b3tOs9vofSN6upwfyxz6amJs7NxYxkLy+9PHxm88t8sX+2fV/YH/r/r8zbh6JhyMiu4j3RcQjEfFo3vbHIuLxiNi/TPw/vfTE+53Hv8ysfBdl8U/d7vxH8/nvPFE6/eN3ncdfyM7/4XrqQP7ISl7/VtrAtRw7AAAA+L9I65+BT9KRhXSajow0PsO/K7am1ZnZuWdOzHx4dqrxWfmhqKTFTNdg03zoWD43XOTHF+UP5fPGX5a21PMjkzPVqV4HD31uW5v+n/mz1OvWAevO97Wgf+n/0L/0f+hf+j/0L/0f+ler/v9JD9oBbLiX0+XLt2xUQ4CNZ/wP/Uv/h/6l/0Nfavvd+HRNX/mX6FHi+4G1/VbDyhOR3iEh3zWJSrQsKq/4xyxWmdjUsqjXr0wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADd8V8AAAD//zMS4m8=") 17:00:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPDvru30/Ut+pTxaWggURMUjadIHPXABgcQBJCQ4FHEKSVqVug1qgkSrCgqHckSVuCOOSPwFXCgXBJyQuMIdIUUolxZORmvvpm5qJ3HixKX+fKRNZjxrzXx3d+zZGdsB9K3h7E8SsTMifouIwUb29h2GG/9uLlye/Hvh8mQStdqbfyX1/W4sXJ4sdi2et6ORqZXz/JYW9V59J2KiWp2+kOdH5869Pzp78dJzZ85NnJ4+PX1+/MSJo0cODBwfP9aVOLO4buz7aGb/3lffvvb65Mlr7/70TdbenXl5cxzdMtw4ui092e3KemxXUzop97AhdKQUEdnpqtT7/2CUYtti2WC88mlPGwdsqFotrbV6f86lNeAelo3mgX5UvNFn97/FtklDj7vC/IuNG6As7pv51igpR5rvU1lyf9tNwxFx8so/X2ZbbNA8BABAs+vZ+OfZVuO/NB5o2u9/+RrKUET8PyJ2R8R9EbEnIu6PqO/7YEQ81GH9S1dI7hz/1AbXFNgqZeO/F/K1rdvHf8XoL4ZKeW5XPf5KcupMdfpwfkwORWVLlh9bpo7vX/7183ZlzeO/bMvqL8aCeTv+LC+ZoJuamJtYT8zN5j+J2FduFX8SxTJOEhF7I2LfGus48/TX+9uVrRz/MrqwzlT7KuKpxvm/EkviLyRt1yfHnj8+fmx0a1SnD48WV8Wdfv7l6hvt6l9X/F0wf70W21te/4vxDyVbI2YvXjpbX6+d7byOq79/1vaeZq3X/0DyVpG9kv35cGJu7sJYxEDyWv3Bgbyw/vj4recW+WL/7Po/dLB1/98dt47EwxGRXcQHIuKRiHg0b/tjEfF4RBxcJv4fX3rivc7jX2ZWvouy+KdWOv/RfP47T5TO/vBt5/EXsvN/tJ46lD+ymte/1TZwPccOAAAA/ivS+mfgk3RkMZ2mIyONz/Dvie1pdWZ27plTMx+cn2p8Vn4oKmkx0zXYNB86ls8NF/nxJfkj+bzxF6Vt9fzI5Ex1qtfBQ5/b0ab/Z/4o9bp1wIbzfS3oX/o/9C/9H/qX/g/9S/+H/tWq/3/cg3YAm2+F9/9tm9UOYPMZ/0P/0v+hf+n/0Jfafjc+XddX/iV6lPhuYH2/1bD6RKR3Scj3TKISLYvKq/4xizUmtrQs6vUrEwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQHf8GwAA///ewOIq") [ 2941.736710][T28557] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2941.752432][T28560] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2941.763522][T28557] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature 17:00:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2941.782813][T28557] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2941.797130][T28560] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 17:00:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPDv+pG+f8mvlEdLC4GCqHgkTfqgBy4gQBxAQoJDEaeQpFWp26AmSLSKIHAIR1SJO+KIxF/AhXJBwAmJK9wRUoRyaeGC0dq7jZvYaZw4cak/H2mTGe9YM9/dHXt2xnYAPWsw/ZNE7I6IXyOiv569tcBg/d+NxdnxvxZnx5OoVt/4M6mVu744O54XzZ+3q56plrL8tib1zr8dMVapTF7K8sMzF94bnr585ZlzF8bOTp6dvDh66tTxY4f6To6e6EicaVzXD3w4dXD/K29dfW389NV3fvw6be/ubH9jHJ0yWD+6TT3e6cq6bE9DOil1sSG0pRgR6ekq1/p/fxRjx819/fHSJ11tHLCpqtVCtdn7c2auCtzF0tE80IvyN/r0/jfftmjocUdYeL5+A5TGfSPb6ntKUcjKlJfd33bSYEScnvv7i3SLTZqHAABodC0d/zzdbPxXiPsayv0vW0MZiIj/R8TeiLgnIvZFxL0RtbL3R8QDbda/fIVk5fin2r+uwNYoHf89l61t3Tr+y0d/MVDMcntq8ZeTM+cqk0ezY3IkytvS/MgqdXz34i+ftdrXOP5Lt7T+fCyYteOP0rIJuomxmbGNxNxo4eOIA6Vm8SeRL+MkEbE/Ig6ss45zT351sNW+28e/ig6sM1W/jHiifv7nYln8uZdbrk+OPHty9MTw9qhMHh3Or4qVfvp5/vVW9W8o/g5YuFaNnU2v/zz+5J9ke8T05Svna+u10+3XMf/bpy3vadZ7/fclb9bSfdljH4zNzFwaiehLXl35+OjSc/N8Xj69/o8cbt7/98bSkXgwItKL+FBEPBQRD2dtfyQiHo2Iw6vE/8MLj73bfvyrzMp3UBr/xKrnPwbS1NL5bz9RPP/9N+3Hn0vP//Fa6kj2yFpe/9bawI0cOwAAAPivKNQ+A58Uhm6mC4Whofpn+PfFzkJlanrmqTNT71+cqH9WfiDKhXymq79hPnQkmxvO86PL8seyeePPiztq+aHxqcpEt4OHHrerRf9P/V7sduuATef7WtC79H/oXfo/9C79H3qX/g+9q1n//6gL7QC23m3e/3dsVTuArWf8D71L/4fepf9DT2r53fjChr7yL9GlxLd9G/uthrUnonCHhHzXJMrRdFdpzT9msc7Etqa7uv3KBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0Bn/BgAA///yfONi") 17:00:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2941.846008][T28571] loop2: detected capacity change from 0 to 512 [ 2941.871292][T28571] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2941.871795][T28572] loop5: detected capacity change from 0 to 512 [ 2941.888234][T28572] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 17:00:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2941.896568][T28574] loop4: detected capacity change from 0 to 512 [ 2941.898491][T28578] loop3: detected capacity change from 0 to 512 [ 2941.910896][T28571] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2941.920738][T28571] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2941.929422][T28578] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2941.933395][T28572] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2941.940461][T28571] ext4_test_bit(bit=14, block=4) = 1 [ 2941.952608][T28571] is_bad_inode(inode)=0 [ 2941.955236][T28572] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2941.956753][T28571] NEXT_ORPHAN(inode)=0 [ 2941.956800][T28571] max_ino=32 [ 2941.974449][T28571] i_nlink=1 [ 2941.974481][T28574] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2941.987212][T28572] ext4_test_bit(bit=14, block=4) = 1 [ 2941.992556][T28572] is_bad_inode(inode)=0 17:00:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2941.996733][T28572] NEXT_ORPHAN(inode)=0 [ 2942.000826][T28572] max_ino=32 [ 2942.004018][T28572] i_nlink=1 [ 2942.008096][T28578] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2942.010366][T28585] loop0: detected capacity change from 0 to 512 [ 2942.027280][T28574] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2942.035387][T28585] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem 17:00:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2942.057785][T28578] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2942.072389][T28588] loop2: detected capacity change from 0 to 512 [ 2942.080693][T28585] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2942.095340][T28588] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2942.102966][T28592] loop5: detected capacity change from 0 to 512 [ 2942.109999][T28585] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2942.112158][T28574] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2942.133057][T28592] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2942.138821][T28574] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) 17:00:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:01 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPDv+pG+f8mvlEdLC4GCqHgkTfqgBy4gkDiAQIJDEaeQpFWp26AmSLSKIHAIR1SJO+KIxF/AhXJBwAmJK9wRUoRyaeGC0dq7jZvYaZw4cak/H2mTGe9YM9/dHXt2xnYAPWsw/ZNE7I6IXyOiv569tcBg/d+NxdnxvxZnx5OoVt/4M6mVu744O54XzZ+3q56plrL8tib1zr8dMVapTF7K8sMzF94bnr585ZlzF8bOTp6dvDh66tTxY4f6To6e6EicaVzXD3w4dXD/y29dfXX89NV3fvw6be/ubH9jHJ0yWD+6TT3e6cq6bE9DOil1sSG0pRgR6ekq1/p/fxRjx819/fHSJ11tHLCpqtVCtdn7c2auCtzF0tE80IvyN/r0/jfftmjocUdYeL5+A5TGfSPb6ntKUcjKlJfd33bSYEScnvv7i3SLTZqHAABodC0d/zzdbPxXiPsayv0vW0MZiIj/R8TeiLgnIvZFxL0RtbL3R8QDbda/fIVk5fin2r+uwNYoHf89l61t3Tr+y0d/MVDMcntq8ZeTM+cqk0ezY3IkytvS/MgqdXz34i+ftdrXOP5Lt7T+fCyYteOP0rIJuomxmbGNxNxo4eOIA6Vm8SeRL+MkEbE/Ig6ss45zT351sNW+28e/ig6sM1W/jHiifv7nYln8uddark+OPHty9MTw9qhMHh3Or4qVfvp5/vVW9W8o/g5YuFaNnU2v/zz+5J9ke8T05Svna+u10+3XMf/bpy3vadZ7/fclb9bSfdljH4zNzFwaiehLXln5+OjSc/N8Xj69/o8cbt7/98bSkXgwItKL+FBEPBQRD2dtfyQiHo2Iw6vE/8MLj73bfvyrzMp3UBr/xKrnPwbS1NL5bz9RPP/9N+3Hn0vP//Fa6kj2yFpe/9bawI0cOwAAAPivKNQ+A58Uhm6mC4Whofpn+PfFzkJlanrmqTNT71+cqH9WfiDKhXymq79hPnQkmxvO86PL8seyeePPiztq+aHxqcpEt4OHHrerRf9P/V7sduuATef7WtC79H/oXfo/9C79H3qX/g+9q1n//6gL7QC23m3e/3dsVTuArWf8D71L/4fepf9DT2r53fjChr7yL9GlxLd9G/uthrUnonCHhHzXJMrRdFdpzT9msc7Etqa7uv3KBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0Bn/BgAA///KReNr") 17:00:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2942.143348][T28578] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2942.168184][T28588] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2942.194943][T28592] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2942.209431][T28588] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2942.223012][T28588] ext4_test_bit(bit=14, block=4) = 1 [ 2942.228383][T28588] is_bad_inode(inode)=0 [ 2942.232605][T28588] NEXT_ORPHAN(inode)=0 [ 2942.232976][T28600] loop4: detected capacity change from 0 to 512 [ 2942.236656][T28588] max_ino=32 [ 2942.236663][T28588] i_nlink=1 [ 2942.243004][T28601] loop0: detected capacity change from 0 to 512 17:00:02 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0x0, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2942.244415][T28601] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2942.250400][T28592] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2942.264222][T28601] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2942.289610][T28600] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2942.300971][T28592] ext4_test_bit(bit=14, block=4) = 1 17:00:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2942.306310][T28592] is_bad_inode(inode)=0 [ 2942.310577][T28592] NEXT_ORPHAN(inode)=0 [ 2942.314654][T28592] max_ino=32 [ 2942.317892][T28592] i_nlink=1 [ 2942.322548][T28601] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2942.328289][T28600] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2942.343208][T28605] loop3: detected capacity change from 0 to 512 17:00:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPCvn33/kl8pj4YWAgUR8Uia9EEPXEAgcQAJCQ5FnEKSVqFug5og0SqCwCEcUSXuiCMSfwEXygUBJySucEdIEcqlhZPR2ruNm9hpnDhxqT8faZMZ71gz390de3bGdgA9azD5k4vYHxG/RURfPXt7gcH6v5vL8xN/L89P5KJaffOvXK3cjeX5iaxo9rx99Uy1mOZ3Nal38Z2I8Upl6nKaH5m7+P7I7JWrz01fHD8/dX7q0tiZMydPHC2fHjvVkTiTuG4MfDRz5PCrb197feLstXd/+iZp7/50f2McnTJYP7pNPdnpyrrsQEM6V+xiQ2hLISKS01Wq9f++KMSeW/v64pVPu9o4YFtVq/lqs/fn1EIVuIclo3mgF2Vv9Mn9b7bt0NDjrrD0Yv0GKIn7ZrrV9xQjn5Yprbq/7aTBiDi78M+XyRbbNA8BANDoejL+ebbZ+C8fDzSU+1+6htIfEf+PiIMRcV9EHIqI+yNqZR+MiIfarH/1Csna8U+1b1OBbVAy/nshXdu6ffyXjf6iXEhzB2rxl3LnpitTx9NjMhSlXUl+dJ06vn/5189b7Wsc/yVbUn82Fkzb8Wdx1QTd5Pjc+FZibrT0ScRAsVn8uciWcXIRcTgiBjZZx/TTXx9pte/O8a+jA+tM1a8inqqf/4VYFX8m13J9cvT502OnRnZHZer4SHZVrPXzL4tvtKp/S/F3wNL1auxtev03xL87YvbK1Qu19drZ9utY/P2zlvc0m73+y7m3auly+tiH43Nzl0cjyrnX1j4+tvLcLJ+VT67/oWPN+//BWDkSD0dEchEfjYhHIuLRtO2PRcTjEXFsnfh/fOmJ99qPf51Z+Q5K4p9c//z3J6mV899+onDhh2/bjz+TnP+TtdRQ+shGXv822sCtHDsAAAD4r8jXPgOfyw/fSufzw8P1z/Afir35yszs3DPnZj64NFn/rHx/lPLZTFdfw3zoaDo3nOXHVuVPpPPGXxT21PLDEzOVyW4HDz1uX4v+n/ij0O3WAdvO97Wgd+n/0Lv0f+hd+j/0Lv0felez/v9xF9oB7Lw7vP/v2al2ADvP+B96l/4PvUv/h57U8rvx+S195V+iS4nvylv7rYaNJyJ/l4R8zyRK0XRXccM/ZrHJxK6mu7r9ygQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANAZ/wYAAP//zbbiFA==") 17:00:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:02 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x0, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2942.348081][T28600] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2942.350683][T28605] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2942.402448][T28610] loop2: detected capacity change from 0 to 512 [ 2942.413739][T28610] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2942.417671][T28614] loop5: detected capacity change from 0 to 512 [ 2942.430090][T28614] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2942.434593][T28600] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) 17:00:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2942.463899][T28610] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2942.465647][T28605] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2942.472346][T28614] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2942.504670][T28605] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2942.504948][T28614] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2942.521294][T28605] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2942.531875][T28620] loop0: detected capacity change from 0 to 512 [ 2942.541689][T28614] ext4_test_bit(bit=14, block=4) = 1 [ 2942.551892][T28614] is_bad_inode(inode)=0 [ 2942.556036][T28614] NEXT_ORPHAN(inode)=0 [ 2942.560140][T28614] max_ino=32 [ 2942.563333][T28614] i_nlink=1 [ 2942.565057][T28610] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2942.569238][T28620] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2942.590391][T28610] ext4_test_bit(bit=14, block=4) = 1 [ 2942.595704][T28610] is_bad_inode(inode)=0 [ 2942.599921][T28610] NEXT_ORPHAN(inode)=0 17:00:02 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x0, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2942.604033][T28610] max_ino=32 [ 2942.607223][T28610] i_nlink=1 [ 2942.616378][T28620] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2942.632418][T28625] loop4: detected capacity change from 0 to 512 17:00:02 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x0, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2942.656515][T28620] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2942.669594][T28625] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2942.688635][T28628] loop3: detected capacity change from 0 to 512 17:00:02 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x0, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2942.705181][T28634] loop5: detected capacity change from 0 to 512 [ 2942.706439][T28630] loop2: detected capacity change from 0 to 512 [ 2942.718489][T28634] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2942.723079][T28625] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2942.730080][T28628] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2942.745428][T28634] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2942.754474][T28628] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2942.757174][T28625] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2942.777728][T28634] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2942.782672][T28625] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) 17:00:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2942.795795][T28628] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2942.813329][T28630] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2942.818152][T28640] loop0: detected capacity change from 0 to 512 [ 2942.828036][T28634] ext4_test_bit(bit=14, block=4) = 1 [ 2942.833350][T28634] is_bad_inode(inode)=0 [ 2942.837567][T28634] NEXT_ORPHAN(inode)=0 [ 2942.837707][T28640] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2942.841662][T28634] max_ino=32 [ 2942.841669][T28634] i_nlink=1 17:00:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2942.852002][T28628] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2942.854191][T28630] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2942.882395][T28630] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2942.912792][T28640] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2942.929549][T28640] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2942.930015][T28630] ext4_test_bit(bit=14, block=4) = 1 [ 2942.941834][T28719] loop4: detected capacity change from 0 to 512 [ 2942.943023][T28630] is_bad_inode(inode)=0 [ 2942.953446][T28630] NEXT_ORPHAN(inode)=0 [ 2942.957584][T28630] max_ino=32 17:00:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPCvX2nSxy/5lfJoaCFQEBGPpEkf9MAFBBIHkJDgUMQpJGkV6jaoCRKtIggcwhFV4o44IvEXcKFcEHBC4gp3hBShXFo4Ga2927iJncaJE5f685E2mfGONfPd3bFnZ2wH0LWGkj+5iP0R8VtE9NeytxcYqv27ubIw+ffKwmQuKpU3/8pVy91YWZjMimbP21fLVIppfk+DepfeiZgol6cvp/nR+Yvvj85dufrczMWJ89Pnpy+Nnzlz8sTRntPjp9oSZxLXjcGPZo8cfvXta69Pnr327k/fJO3dn+6vj6NdhmpHt6En211Zhx2oS+eKHWwILSlERHK6StX+3x+F6Lu1rz9e+bSjjQN2VKWSrzR6f04tVoB7WDKaB7pR9kaf3P9m2y4NPe4Kyy/WboCSuG+mW21PMfJpmdKa+9t2GoqIs4v/fJlssUPzEAAA9a4n459nG43/8vFAXbn/pWsoAxHx/4g4GBH3RcShiLg/olr2wYh4qMX6166QrB//VPq3FNgmJeO/F9K1rdvHf9noL3oLae5ANf5S7txMefp4ekyGo7QnyY9tUMf3L//6ebN99eO/ZEvqz8aCaTv+LK6ZoJuamJ/YTsz1lj+JGCw2ij8X2TJOLiIOR8TgFuuYefrrI8323Tn+DbRhnanyVcRTtfO/GGviz+Sark+OPX96/NRob5Snj49mV8V6P/+y9Eaz+rcVfxssX6/E3obXf138vRFzV65eqK7XzrVex9LvnzW9p9nq9d+Te6ua7kkf+3Bifv7yWERP7rX1j4+vPjfLZ+WT63/4WOP+fzBWj8TDEZFcxEcj4pGIeDRt+2MR8XhEHNsg/h9feuK91uPfYFa+jZL4pzY+/wNJavX8t54oXPjh29bjzyTn/2Q1NZw+spnXv802cDvHDgAAAP4r8tXPwOfyI7fS+fzISO0z/Idib748Ozf/zLnZDy5N1T4rPxClfDbT1V83HzqWzg1n+fE1+RPpvPEXhb5qfmRytjzV6eChy+1r0v8TfxQ63Tpgx/m+FnQv/R+6l/4P3Uv/h+6l/0P3atT/P+5AO4Ddd4f3/77dagew+4z/oXvp/9C99H/oSk2/G5/f1lf+JTqU+K5ne7/VsPlE5O+SkO+ZRCka7ipu+scstpjY03BXp1+ZAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2uPfAAAA//+P6OIW") 17:00:02 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x0, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBvHTt9k1DKo6UVgYKIeCRN+qAHLiCQOICEBIciTiFJq1C3QU2QaBVB4BCOqBJ3xBGJv4AL5YKAExJXuCOkCOXSwslo7d3UTewkTpy41L+ftMmMd6yZb3fHnp2xHUDXGkj/JBH7I+L3iOirZe8sMFD7d2tpbvyfpbnxJCqVt/5OquVuLs2N50Xz5+2rZSrFLL+rQb0L70aMlcuTV7L88OylD4Znrl57furS2IXJC5OXR8+ePXXyWO+Z0dNtiTON6+aRj6ePHn7tnetvjJ+7/t7P36bt3Z/tr4+jXQZqR7ehp9pdWYcdqEsnxQ42hJak5y09XaVq/++LntizvK8vXv2so40DtlWlUqg0en/OzFeAe1g6mge6Uf5Gn97/5tsODT3uCosv1W6A0rhvZVttTzEKWZnSivvbdhqIiHPz/36VbrFN8xAAAPVupOOf5xqN/wrxUF25+7I1lP6IuD8iDkbEAxFxKCIejKiWfTgiHmmx/pUrJKvHP5W+TQW2Qen478VsbevO8V8++ov+nix3oBp/KTk/VZ48kR2TwSjtSvMja9Txwyu/fdFsX/34L93S+vOxYNaOv4orJugmxmbHthJzvcVPI44UG8WfRL6Mk0TE4Yg4ssk6pp755mizfevHv4Y2rDNVvo54unb+52NF/Lmk6frkyAtnRk8P747y5Inh/KpY7ZdfF95sVv+W4m+DxRuV2Nvw+l+Ovz/ZHTFz9drF6nrtTOt1LPzxedN7ms1e/73J29V0b/bYR2Ozs1dGInqT11c/Pnr7uXk+L59e/4PHG/f/g3H7SDwaEelFfCyierwey9r+eEQ8ERHH14j/p5effL/1+NeYlW+jNP6J9c5/1J//1hM9F3/8rvX4c+n5P1VNDWaPbOT1b6MN3MqxAwAAgP+LQvUz8ElhaDldKAwN1T7Dfyj2FsrTM7PPnp/+8PJE7bPy/VEq5DNdfXXzoSPZ3HCeH12RP5nNG3/Zs6eaHxqfLk90Onjocvua9P/Unz2dbh2w7XxfC7qX/g/dS/+H7qX/Q/fS/6F7Ner/n3SgHcDOW+f9f89OtQPYecb/0L30f+he+j90pabfjS9s6Sv/Eh1KfN+7td9q2HgiCndJyPdMohQNdxU3/GMWm0zsarir069MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA7fFfAAAA///n6eIk") [ 2942.960801][T28630] i_nlink=1 17:00:02 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x0, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2942.987128][T28719] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2942.993022][T28749] loop0: detected capacity change from 0 to 512 [ 2943.021604][T28754] loop3: detected capacity change from 0 to 512 [ 2943.034155][T28749] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2943.043700][T28719] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2943.051866][T28754] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2943.052809][T28753] loop5: detected capacity change from 0 to 512 [ 2943.066570][T28719] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2943.083247][T28753] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2943.097475][T28754] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2943.098937][T28761] loop2: detected capacity change from 0 to 512 [ 2943.106761][T28719] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2943.115149][T28754] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature 17:00:02 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBv/UjfTSjl0dJCoCAqHkmTPuiBCwgkDiAhwaGIU0jSqtRtUBMkWkUQOIQjqsQdcUTiL+BCuSDghMQV7ggpQrm0cDJaezd1UzuJEycu9e8nbTLjWWvm292xZ2dsB9CzBtM/ScTuiPg9Ivrr2dt3GKz/u7k4O/7P4ux4EtXqW38ntf1uLM6O57vmz9tVz1RLWX5bk3rn340Yq1QmL2f54ZmLHwxPX7n6/PmLY+cmz01eGj19+sTxw32nRk92JM40rhsHP546dOC1d669MX7m2ns/f5u2d3dW3hhHpwzWj25TT3W6si7b05BOSl1sCG0pRkR6usq1/t8fxdixVNYfr37W1cYBm6paLVSbvT9n9laBe1g6mgd6Uf5Gn97/5tsWDT3uCgsv1W+A0rhvZlu9pBSFbJ/ysvvbThqMiDNz/36VbrFJ8xAAAI2up+Of55qN/wrxYMN+e7M1lIGIuC8i9kXE/RGxPyIeiKjt+1BEPNxm/ctXSO4c/1T71xXYGqXjvxezta3bx3/56C8GilluTy3+cnL2fGXyWHZMjkZ5W5ofWaGOH1757YtWZY3jv3RL68/Hglk7/iotm6CbGJsZ20jMjRY+jThYahZ/EvkyThIRByLi4DrrOP/MN4dala0e/wo6sM5U/Tri6fr5n4tl8eeSluuTIy+cGj05vD0qk8eG86viTr/8Ov9mq/o3FH8HLFyvxs6m1/9S/APJ9ojpK1cv1NZrp9uvY/6Pz1ve06z3+u9L3s6zc+mfj8ZmZi6PRPQlr9ce7MsKa4+P3npuns/3T6//o0ea9/99cetIPBIR6UV8OCIejYjHsrY/HhFPRMSRFeL/6eUn328//hVm5TsojX9itfMfjee//UTxwo/ftR9/Lj3/J2qpo9kja3n9W2sDN3LsAAAA4P+iUPsMfFIYWkoXCkND9c/w74+dhcrU9MyzZ6c+vDRR/6z8QJQL+UxXf8N86Eg2N5znR5flj2fzxl8Wd9TyQ+NTlYluBw89bleL/p/6s9jt1gGbzve1oHfp/9C79H/oXfo/9C79H3pXs/7/SRfaAWy9Vd7/d2xVO4CtZ/wPvUv/h96l/0NPavnd+MKGvvIv0aXE930b+62GtSeicJeEfM8kytG0qLTmH7NYZ2Jb06JuvzIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB0xn8BAAD//1Ac4jY=") [ 2943.126759][T28761] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2943.141914][T28753] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2943.148013][T28749] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2943.161730][T28754] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) 17:00:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2943.172306][T28753] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2943.195897][T28749] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2943.206768][T28753] ext4_test_bit(bit=14, block=4) = 1 [ 2943.212134][T28753] is_bad_inode(inode)=0 [ 2943.215781][T28761] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2943.216265][T28753] NEXT_ORPHAN(inode)=0 [ 2943.216273][T28753] max_ino=32 [ 2943.231773][T28753] i_nlink=1 17:00:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2943.239931][T28761] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2943.256780][T28767] loop4: detected capacity change from 0 to 512 [ 2943.274445][T28767] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem 17:00:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2943.286777][T28761] ext4_test_bit(bit=14, block=4) = 1 [ 2943.292107][T28761] is_bad_inode(inode)=0 [ 2943.296359][T28761] NEXT_ORPHAN(inode)=0 [ 2943.300440][T28761] max_ino=32 [ 2943.303636][T28761] i_nlink=1 [ 2943.309600][T28771] loop3: detected capacity change from 0 to 512 [ 2943.331269][T28767] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2943.342988][T28771] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2943.356601][T28767] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2943.372510][T28776] loop5: detected capacity change from 0 to 512 [ 2943.373474][T28771] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2943.387168][T28775] loop0: detected capacity change from 0 to 512 17:00:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2943.390254][T28771] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2943.406344][T28767] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2943.409512][T28776] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2943.428491][T28775] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem 17:00:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3b8, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x418) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2943.437748][T28771] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2943.464056][T28776] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2943.464154][T28775] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2943.486221][T28785] loop2: detected capacity change from 0 to 512 17:00:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3b8, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x418) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2943.493205][T28775] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2943.513733][T28776] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2943.514135][T28789] loop4: detected capacity change from 0 to 512 17:00:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2943.537693][T28789] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2943.549604][T28789] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2943.560444][T28789] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2943.562035][T28785] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2943.575611][T28776] ext4_test_bit(bit=14, block=4) = 1 [ 2943.588338][T28776] is_bad_inode(inode)=0 17:00:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3b8, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x418) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBv/UjfJJTyaGkhUBAVj6RJH/TABQQSB5CQ4FDEKSRpVeo2qAkSrSoIHMIRVeKOOCLxF3ChXBBwQuIKd4QUoVxauGC09m7iJnYaJ05c6t9P2mTGO9bMt7tjz87YDqBnDaZ/kojdEfFbRPTXs7cWGKz/u7lwdfzvhavjSVSrb/6V1MrdWLg6nhfNn7ernqmWsvy2JvXOvRMxVqlMXsrywzMX3h+evnzluXMXxs5Onp28OHrq1PFjh/pOjp7oSJxpXDcOfDR1cP+rb197ffz0tXd/+iZt7+5sf2McnTJYP7pNPdnpyrpsT0M6KXWxIbSlGBHp6SrX+n9/FGPH4r7+eOXTrjYO2FTVaqHa7P05M1sF7mLpaB7oRfkbfXr/m29bNPS4I8y/WL8BSuO+mW31PaUoZGXKy+5vO2kwIk7P/vNlusUmzUMAADS6no5/nm02/ivEAw3l7snWUAYi4t6I2BsR90XEvoi4P6JW9sGIeKjN+pevkKwc/1T71xXYGqXjvxeyta1bx3/56C8GilluTy3+cnLmXGXyaHZMjkR5W5ofWaWO71/+9fNW+xrHf+mW1p+PBbN2/FlaNkE3MTYztpGYG81/EnGg1Cz+JPJlnCQi9kfEgXXWce7prw+22nf7+FfRgXWm6lcRT9XP/2wsi39R0mp9cuT5k6MnhrdHZfLocH5VrPTzL3NvtKp/Q/F3wPz1auxsev3n8Sf/Jtsjpi9fOV9br51uv4653z9reU+z3uu/L3mrlu7LHvtwbGbm0khEX/LaysdHl56b5/Py6fV/5HDz/r83lo7EwxGRXsSHIuKRiHg0a/tjEfF4RBxeJf4fX3rivfbjX2VWvoPS+CdWPf8xkKaWzn/7ieL5H75tP/5cev6P11JHskfW8vq31gZu5NgBAADA/0Wh9hn4pDC0mC4Uhobqn+HfFzsLlanpmWfOTH1wcaL+WfmBKBfyma7+hvnQkWxuOM+PLssfy+aNvyjuqOWHxqcqE90OHnrcrhb9P/VHsdutAzad72tB79L/oXfp/9C79H/oXfo/9K5m/f/jLrQD2Hq3ef/fsVXtALae8T/0Lv0fepf+Dz2p5XfjCxv6yr9ElxLf9W3stxrWnojCHRLyXZMoR9NdpTX/mMU6E9ua7ur2KxMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEBn/BcAAP//0YrjHQ==") 17:00:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2943.592599][T28776] NEXT_ORPHAN(inode)=0 [ 2943.596717][T28776] max_ino=32 [ 2943.599960][T28776] i_nlink=1 [ 2943.605499][T28789] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2943.633341][T28785] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 17:00:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2943.646905][T28785] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2943.655512][T28798] loop0: detected capacity change from 0 to 512 [ 2943.665496][T28798] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2943.690544][T28800] loop3: detected capacity change from 0 to 512 [ 2943.696978][T28785] ext4_test_bit(bit=14, block=4) = 1 [ 2943.702307][T28785] is_bad_inode(inode)=0 [ 2943.706459][T28785] NEXT_ORPHAN(inode)=0 [ 2943.710598][T28785] max_ino=32 [ 2943.713794][T28785] i_nlink=1 [ 2943.728556][T28800] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem 17:00:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBvHTt9k1DKo6UVgYKIeCRN+qAHLiCQOICEBIciTiFJq1C3QU2QaBVB4BCOqBJ3xBGJv4AL5YKAExJXuCOkCOXSwslo7d3UTewkTpy41L+ftMmMd6yZb3fHnp2xHUDXGkj/JBH7I+L3iOirZe8sMFD7d2tpbvyfpbnxJCqVt/5OquVuLs2N50Xz5+2rZSrFLL+rQb0L70aMlcuTV7L88OylD4Znrl57furS2IXJC5OXR8+ePXXyWO+Z0dNtiTON6+aRj6ePHn7tnetvjJ+7/t7P36bt3Z/tr4+jXQZqR7ehp9pdWYcdqEsnxQ42hJak5y09XaVq/++LntizvK8vXv2so40DtlWlUqg0en/OzFeAe1g6mge6Uf5Gn97/5tsODT3uCosv1W6A0rhvZVttTzEKWZnSivvbdhqIiHPz/36VbrFN8xAAAPVupOOf5xqN/wrxUF25+7I1lP6IuD8iDkbEAxFxKCIejKiWfTgiHmmx/pUrJKvHP5W+TQW2Qen478VsbevO8V8++ov+nix3oBp/KTk/VZ48kR2TwSjtSvMja9Txwyu/fdFsX/34L93S+vOxYNaOv4orJugmxmbHthJzvcVPI44UG8WfRL6Mk0TE4Yg4ssk6pp755mizfevHv4Y2rDNVvo54unb+52NF/Lmk6frkyAtnRk8P747y5Inh/KpY7ZdfF95sVv+W4m+DxRuV2Nvw+l+Ovz/ZHTFz9drF6nrtTOt1LPzxedN7ms1e/73J29V0b/bYR2Ozs1dGInqT11c/Pnr7uXk+L59e/4PHG/f/g3H7SDwaEelFfCx7HXgsa/vjEfFERBxfI/6fXn7y/dbjX2NWvo3S+CfWO/9Rf/5bT/Rc/PG71uPPpef/VDU1mD2ykde/jTZwK8cOAAAA/i8K1c/AJ4Wh5XShMDRU+wz/odhbKE/PzD57fvrDyxO1z8r3R6mQz3T11c2HjmRzw3l+dEX+ZDZv/GXPnmp+aHy6PNHp4KHL7WvS/1N/9nS6dcC2830t6F76P3Qv/R+6l/4P3Uv/h+7VqP9/0oF2ADtvnff/PTvVDmDnGf9D99L/oXvp/9CVmn43vrClr/xLdCjxfe/Wfqth44ko3CUh3zOJUjTcVdzwj1lsMrGr4a5OvzIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0x38BAAD//38B4ic=") [ 2943.730105][T28798] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2943.756395][T28798] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2943.759268][T28800] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2943.780769][T28806] loop5: detected capacity change from 0 to 512 17:00:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0x0, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2943.788585][T28800] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2943.805007][T28800] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2943.830750][T28806] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2943.858302][T28815] loop0: detected capacity change from 0 to 512 [ 2943.861277][T28806] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2943.882595][T28821] loop3: detected capacity change from 0 to 512 [ 2943.883078][T28816] loop2: detected capacity change from 0 to 512 [ 2943.890476][T28815] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem 17:00:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383"}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2943.907770][T28822] loop4: detected capacity change from 0 to 512 [ 2943.914339][T28821] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2943.923878][T28806] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2943.924268][T28815] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2943.935088][T28806] ext4_test_bit(bit=14, block=4) = 1 [ 2943.954060][T28806] is_bad_inode(inode)=0 17:00:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383"}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2943.958238][T28806] NEXT_ORPHAN(inode)=0 [ 2943.962320][T28806] max_ino=32 [ 2943.962651][T28822] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2943.965496][T28806] i_nlink=1 [ 2943.970448][T28816] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2943.974314][T28821] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2943.977280][T28815] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 17:00:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2944.002651][T28821] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2944.003178][T28816] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2944.033818][T28822] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2944.037246][T28816] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2944.041981][T28821] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2944.064722][T28822] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2944.086113][T28816] ext4_test_bit(bit=14, block=4) = 1 [ 2944.089343][T28822] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2944.091431][T28816] is_bad_inode(inode)=0 17:00:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383"}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2944.107699][T28816] NEXT_ORPHAN(inode)=0 [ 2944.111798][T28816] max_ino=32 [ 2944.114988][T28816] i_nlink=1 [ 2944.127619][T28832] loop0: detected capacity change from 0 to 512 [ 2944.170363][T28836] loop5: detected capacity change from 0 to 512 [ 2944.178701][T28836] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2944.188339][T28832] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2944.197551][T28836] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2944.206715][T28836] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2944.218162][T28836] ext4_test_bit(bit=14, block=4) = 1 [ 2944.221045][T28841] loop4: detected capacity change from 0 to 512 [ 2944.223490][T28836] is_bad_inode(inode)=0 [ 2944.233857][T28836] NEXT_ORPHAN(inode)=0 [ 2944.237922][T28836] max_ino=32 [ 2944.241160][T28836] i_nlink=1 [ 2944.243888][T28840] loop3: detected capacity change from 0 to 512 [ 2944.254263][T28841] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2944.255029][T28844] loop2: detected capacity change from 0 to 512 17:00:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2944.265200][T28832] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2944.278713][T28844] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2944.295950][T28832] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2944.305843][T28840] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem 17:00:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2944.314331][T28844] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2944.325078][T28841] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2944.335695][T28840] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2944.337790][T28850] loop5: detected capacity change from 0 to 512 [ 2944.346368][T28844] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 17:00:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2944.361397][T28840] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2944.362360][T28844] ext4_test_bit(bit=14, block=4) = 1 [ 2944.374451][T28841] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2944.379654][T28844] is_bad_inode(inode)=0 [ 2944.379661][T28844] NEXT_ORPHAN(inode)=0 [ 2944.379666][T28844] max_ino=32 [ 2944.379672][T28844] i_nlink=1 [ 2944.394045][T28850] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 17:00:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2944.423968][T28840] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2944.438610][T28856] loop0: detected capacity change from 0 to 512 [ 2944.446809][T28841] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2944.459881][T28850] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 17:00:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2944.470692][T28850] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2944.481817][T28856] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2944.483695][T28859] loop2: detected capacity change from 0 to 512 [ 2944.491131][T28850] ext4_test_bit(bit=14, block=4) = 1 [ 2944.501567][T28850] is_bad_inode(inode)=0 [ 2944.505714][T28850] NEXT_ORPHAN(inode)=0 [ 2944.509798][T28850] max_ino=32 [ 2944.512993][T28850] i_nlink=1 17:00:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPCvX2nTNr/kV8qjoYVAQUQ8kiZ90AMXEEgcQEKCQxGnkKRVqNugJki0iiBwCEdUiTviiMRfwIVyQcAJiSvcEVKEcmnhZLT2buMmdhonTlzqz0faZMY71sx3d8eenbEdQNcaSv7kIg5ExG8R0V/L3l5gqPbv5srC5N8rC5O5qFTe/CtXLXdjZWEyK5o9b38tUymm+T0N6l16J2KiXJ6+nOZH5y++Pzp35epzMxcnzk+fn740fubMyRNHe06Pn2pLnElcNwY/mj1y+NW3r70+efbauz99k7T3QLq/Po52Gaod3YaebHdlHdZXl84VO9gQWlKIiOR0lar9vz8K0XtrX3+88mlHGwfsqEolX2n0/pxarAD3sGQ0D3Sj7I0+uf/Ntl0aetwVll+s3QAlcd9Mt9qeYuTTMqU197ftNBQRZxf/+TLZYofmIQAA6l1Pxj/PNhr/5eOBunL/S9dQBiLi/xFxMCLui4hDEXF/RLXsgxHxUIv1r10hWT/+qfRvKbBNSsZ/L6RrW7eP/7LRX/QV0lxfNf5S7txMefp4ekyGo7QnyY9tUMf3L//6ebN99eO/ZEvqz8aCaTv+LK6ZoJuamJ/YTsz1lj+JGCw2ij8X2TJOLiIOR8TgFuuYefrrI8323Tn+DbRhnanyVcRTtfO/GGviz+Sark+OPX96/NTo3ihPHx/Nror1fv5l6Y1m9W8r/jZYvl6JfQ2v/7r490bMXbl6obpeO9d6HUu/f9b0nmar139P7q1quid97MOJ+fnLYxE9udfWPz6++twsn5VPrv/hY437/8FYPRIPR0RyER+NiEci4tG07Y9FxOMRcWyD+H986Yn3Wo9/g1n5Nkrin9r4/A8kqdXz33qicOGHb1uPP5Oc/5PV1HD6yGZe/zbbwO0cOwAAAPivyFc/A5/Lj9xK5/MjI7XP8B+Kffny7Nz8M+dmP7g0Vfus/ECU8tlMV3/dfOhYOjec5cfX5E+k88ZfFHqr+ZHJ2fJUp4OHLre/Sf9P/FHodOuAHef7WtC99H/oXvo/dC/9H7qX/g/dq1H//7gD7QB23x3e/3t3qx3A7jP+h+6l/0P30v+hKzX9bnx+W1/5l+hQ4rue7f1Ww+YTkb9LQr5nEqVouKu46R+z2GJiT8NdnX5lAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaI9/AwAA///1VuIb") [ 2944.517082][T28859] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2944.541642][T28859] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2944.558263][T28856] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) 17:00:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2944.567598][T28859] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2944.585056][T28859] ext4_test_bit(bit=14, block=4) = 1 [ 2944.590389][T28859] is_bad_inode(inode)=0 [ 2944.594538][T28859] NEXT_ORPHAN(inode)=0 [ 2944.596875][T28868] loop3: detected capacity change from 0 to 512 [ 2944.598583][T28859] max_ino=32 [ 2944.598590][T28859] i_nlink=1 [ 2944.607618][T28867] loop4: detected capacity change from 0 to 512 17:00:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBvHTt9k1DKo6UVgYKIeCRN+qAHLiCQOICEBIciTiFJq1C3QU2QaBVB4BCOqBJ3xBGJv4AL5YKAExJXuCOkCOXSwslo7d3UTewkTpy41L+ftMmMd6yZb3fHnp2xHUDXGkj/JBH7I+L3iOirZe8sMFD7d2tpbvyfpbnxJCqVt/5OquVuLs2N50Xz5+2rZSrFLL+rQb0L70aMlcuTV7L88OylD4Znrl57furS2IXJC5OXR8+ePXXyWO+Z0dNtiTON6+aRj6ePHn7tnetvjJ+7/t7P36bt3Z/tr4+jXQZqR7ehp9pdWYcdqEsnxQ42hJak5y09XaVq/++LntizvK8vXv2so40DtlWlUqg0en/OzFeAe1g6mge6Uf5Gn97/5tsODT3uCosv1W6A0rhvZVttTzEKWZnSivvbdhqIiHPz/36VbrFN8xAAAPVupOOf5xqN/wrxUF25+7I1lP6IuD8iDkbEAxFxKCIejKiWfTgiHmmx/pUrJKvHP5W+TQW2Qen478VsbevO8V8++ov+nix3oBp/KTk/VZ48kR2TwSjtSvMja9Txwyu/fdFsX/34L93S+vOxYNaOv4orJugmxmbHthJzvcVPI44UG8WfRL6Mk0TE4Yg4ssk6pp755mizfevHv4Y2rDNVvo54unb+52NF/Lmk6frkyAtnRk8P747y5Inh/KpY7ZdfF95sVv+W4m+DxRuV2Nvw+l+Ovz/ZHTFz9drF6nrtTOt1LPzxedN7ms1e/73J29V0b/bYR2Ozs1dGInqT11c/Pnr7uXk+L59e/4PHG/f/g3H7SDwaEelFfCx7DXwsa/vjEfFERBxfI/6fXn7y/dbjX2NWvo3S+CfWO/9Rf/5bT/Rc/PG71uPPpef/VDU1mD2ykde/jTZwK8cOAAAA/i8K1c/AJ4Wh5XShMDRU+wz/odhbKE/PzD57fvrDyxO1z8r3R6mQz3T11c2HjmTzInl+dEX+ZDZv/GXPnmp+aHy6PNHp4KHL7WvS/1N/9nS6dcC2830t6F76P3Qv/R+6l/4P3Uv/h+7VqP9/0oF2ADtvnff/PTvVDmDnGf9D99L/oXvp/9CVmn43vrClr/xLdCjxfe/Wfqth44ko3CUh3zOJUjTcVdzwj1lsMrGr4a5OvzIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0x38BAAD//xYZ4io=") [ 2944.609993][T28856] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2944.627100][T28868] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2944.631491][T28867] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2944.658328][T28868] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 17:00:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2944.669652][T28868] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2944.675890][T28867] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2944.688920][T28874] loop5: detected capacity change from 0 to 512 [ 2944.691944][T28867] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2944.703523][T28874] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 17:00:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2944.713630][T28867] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2944.723149][T28874] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2944.739820][T28868] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2944.740343][T28874] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2944.770501][T28874] ext4_test_bit(bit=14, block=4) = 1 17:00:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2944.775823][T28874] is_bad_inode(inode)=0 [ 2944.780011][T28874] NEXT_ORPHAN(inode)=0 [ 2944.784126][T28874] max_ino=32 [ 2944.787314][T28874] i_nlink=1 [ 2944.789688][T28880] loop0: detected capacity change from 0 to 512 [ 2944.801517][T28880] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2944.815906][T28882] loop2: detected capacity change from 0 to 512 17:00:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3b0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2944.843383][T28884] loop4: detected capacity change from 0 to 512 [ 2944.866368][T28884] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2944.879768][T28882] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem 17:00:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3b0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2944.889098][T28886] loop3: detected capacity change from 0 to 512 [ 2944.905543][T28886] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2944.920134][T28880] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2944.921784][T28884] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2944.946278][T28882] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2944.957881][T28882] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2944.969996][T28880] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2944.970201][T28884] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2944.978884][T28886] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2945.004359][T28886] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2945.024611][T28882] ext4_test_bit(bit=14, block=4) = 1 [ 2945.026010][T28886] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2945.029977][T28882] is_bad_inode(inode)=0 17:00:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3b0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0x70, 0xa0}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2945.046380][T28882] NEXT_ORPHAN(inode)=0 [ 2945.050491][T28882] max_ino=32 [ 2945.053683][T28882] i_nlink=1 [ 2945.082946][T28896] loop5: detected capacity change from 0 to 512 17:00:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2945.104763][T28896] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2945.114242][T28884] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2945.141838][T28896] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 17:00:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x0, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2945.181978][T28896] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2945.216769][T28905] loop0: detected capacity change from 0 to 512 [ 2945.244059][T28896] ext4_test_bit(bit=14, block=4) = 1 [ 2945.249392][T28896] is_bad_inode(inode)=0 [ 2945.253591][T28896] NEXT_ORPHAN(inode)=0 [ 2945.257745][T28896] max_ino=32 [ 2945.260974][T28896] i_nlink=1 [ 2945.270844][T28905] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2945.279171][T28907] loop4: detected capacity change from 0 to 512 [ 2945.300617][T28907] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2945.320334][T28905] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2945.337078][T28912] loop2: detected capacity change from 0 to 512 17:00:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPCvX+n75/xKeTS0ECiIiEfSpA964AICiQNISHAo4hSStAp1G9QEiVYRBA7hiCpxRxyR+Au4UC4IOCFxhTtCilAuLZyM1t5t3MRO48SJS/35SJvMeMea+e7u2LMztgPoWYPJn1zE/oj4LSLK9eztBQbr/24uz0/8vTw/kYtq9c2/crVyN5bnJ7Ki2fP21TPVYprf1aTexXcixiuVqctpfmTu4vsjs1euPjd9cfz81PmpS2Nnzpw8cbTv9NipjsSZxHVj4KOZI4dfffva6xNnr7370zdJe/en+xvj6JTB+tFt6slOV9ZlBxrSuWIXG0JbChGRnK5Srf+XoxB7bu0rxyufdrVxwLaqVvPVZu/PqYUqcA9LRvNAL8re6JP732zboaHHXWHpxfoNUBL3zXSr7ylGPi1TWnV/20mDEXF24Z8vky22aR4CAKDR9WT882yz8V8+Hmgo9790DaU/Iv4fEQcj4r6IOBQR90fUyj4YEQ+1Wf/qFZK1459qeVOBbVAy/nshXdu6ffyXjf6iXEhzB2rxl3LnpitTx9NjMhSlXUl+dJ06vn/5189b7Wsc/yVbUn82Fkzb8Wdx1QTd5Pjc+FZibrT0ScRAsVn8uciWcXIRcTgiBjZZx/TTXx9pte/O8a+jA+tM1a8inqqf/4VYFX8m13J9cvT502OnRnZHZer4SHZVrPXzL4tvtKp/S/F3wNL1auxtev03xL87YvbK1Qu19drZ9utY/P2zlvc0m73++3Jv1dJ96WMfjs/NXR6N6Mu9tvbxsZXnZvmsfHL9Dx1r3v8PxsqReDgikov4aEQ8EhGPpm1/LCIej4hj68T/40tPvNd+/OvMyndQEv/k+ue/P0mtnP/2E4ULP3zbfvyZ5PyfrKWG0kc28vq30QZu5dgBAADAf0W+9hn4XH74VjqfHx6uf4b/UOzNV2Zm5545N/PBpcn6Z+X7o5TPZrrKDfOho+nccJYfW5U/kc4bf1HYU8sPT8xUJrsdPPS4fS36f+KPQrdbB2w739eC3qX/Q+/S/6F36f/Qu/R/6F3N+v/HXWgHsPPu8P6/Z6faAew843/oXfo/9C79H3pSy+/G57f0lX+JLiW+69vabzVsPBH5uyTkeyZRiqa7ihv+MYtNJnY13dXtVyYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDO+DcAAP//t4jiHQ==") 17:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x0, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2945.360263][T28907] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2945.377283][T28912] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem 17:00:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x0, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2945.398294][T28907] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2945.416167][T28919] loop5: detected capacity change from 0 to 512 [ 2945.439408][T28917] loop3: detected capacity change from 0 to 512 [ 2945.445957][T28905] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2945.463101][T28912] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2945.473529][T28919] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2945.492107][T28917] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2945.500881][T28907] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) 17:00:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2945.519473][T28912] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2945.540218][T28912] ext4_test_bit(bit=14, block=4) = 1 [ 2945.545528][T28912] is_bad_inode(inode)=0 [ 2945.549717][T28912] NEXT_ORPHAN(inode)=0 [ 2945.553784][T28912] max_ino=32 [ 2945.556994][T28912] i_nlink=1 17:00:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2945.580286][T28927] loop0: detected capacity change from 0 to 512 [ 2945.583937][T28917] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2945.596108][T28927] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2945.608041][T28919] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2945.616790][T28917] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature 17:00:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2945.632937][T28919] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2945.640116][T28927] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2945.657946][T28919] ext4_test_bit(bit=14, block=4) = 1 [ 2945.663358][T28919] is_bad_inode(inode)=0 [ 2945.667505][T28919] NEXT_ORPHAN(inode)=0 [ 2945.671610][T28919] max_ino=32 [ 2945.674838][T28919] i_nlink=1 17:00:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2945.676180][T28917] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2945.716266][T28927] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 17:00:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBvHTt9k1DKo6UVgYKIeCRN+qAHLiCQOICEBIciTiFJq1C3QU2QaBVB4BCOqBJ3xBGJv4AL5YKAExJXuCOkCOXSwslo7d3UTewkTpy41L+ftMmMd6yZb3fHnp2xHUDXGkj/JBH7I+L3iOirZe8sMFD7d2tpbvyfpbnxJCqVt/5OquVuLs2N50Xz5+2rZSrFLL+rQb0L70aMlcuTV7L88OylD4Znrl57furS2IXJC5OXR8+ePXXyWO+Z0dNtiTON6+aRj6ePHn7tnetvjJ+7/t7P36bt3Z/tr4+jXQZqR7ehp9pdWYcdqEsnxQ42hJak5y09XaVq/++LntizvK8vXv2so40DtlWlUqg0en/OzFeAe1g6mge6Uf5Gn97/5tsODT3uCosv1W6A0rhvZVttTzEKWZnSivvbdhqIiHPz/36VbrFN8xAAAPVupOOf5xqN/wrxUF25+7I1lP6IuD8iDkbEAxFxKCIejKiWfTgiHmmx/pUrJKvHP5W+TQW2Qen478VsbevO8V8++ov+nix3oBp/KTk/VZ48kR2TwSjtSvMja9Txwyu/fdFsX/34L93S+vOxYNaOv4orJugmxmbHthJzvcVPI44UG8WfRL6Mk0TE4Yg4ssk6pp755mizfevHv4Y2rDNVvo54unb+52NF/Lmk6frkyAtnRk8P747y5Inh/KpY7ZdfF95sVv+W4m+DxRuV2Nvw+l+Ovz/ZHTFz9drF6nrtTOt1LPzxedN7ms1e/73J29V0b/bYR2Ozs1dGInqT11c/Pnr7uXk+L59e/4PHG/f/g3H7SDwaEelFfCx73Xssa/vjEfFERBxfI/6fXn7y/dbjX2NWvo3S+CfWO/9Rf/5bT/Rc/PG71uPPpef/VDU1mD2ykde/jTZwK8cOAAAA/i8K1c/AJ4Wh5XShMDRU+wz/odhbKE/PzD57fvrDyxO1z8r3R6mQz3T11c2HjmRzw3l+dEX+ZDZv/GXPnmp+aHy6PNHp4KHL7WvS/1N/9nS6dcC2830t6F76P3Qv/R+6l/4P3Uv/h+7VqP9/0oF2ADtvnff/PTvVDmDnGf9D99L/oXvp/9CVmn43vrClr/xLdCjxfe/Wfqth44ko3CUh3zOJUjTcVdzwj1lsMrGr4a5OvzIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC0x38BAAD//60i4i0=") [ 2945.734046][T28935] loop2: detected capacity change from 0 to 512 [ 2945.737954][T28933] loop5: detected capacity change from 0 to 512 [ 2945.749866][T28935] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2945.767134][T28938] loop4: detected capacity change from 0 to 512 [ 2945.774977][T28940] loop0: detected capacity change from 0 to 512 17:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2945.778730][T28933] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2945.794370][T28938] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2945.797071][T28935] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2945.813162][T28940] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2945.815751][T28938] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 17:00:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2945.821641][T28935] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2945.841560][T28935] ext4_test_bit(bit=14, block=4) = 1 [ 2945.846057][T28938] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2945.846848][T28935] is_bad_inode(inode)=0 [ 2945.865549][T28935] NEXT_ORPHAN(inode)=0 [ 2945.869662][T28935] max_ino=32 [ 2945.870109][T28938] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) 17:00:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvVFUYAPDvzqO8bUV8gKBVNBIfLS0PWbjRaOJCExNdYFzVthBkoIbWRAgRdIFLQ+LeuDTxL3Ajboy6MnGre2NCDBvAjdfcmXvp0M6UTjvtIPP7Jbc9Z+6ZnPPde8/MuefMTAB9azj7k0RsjYjfI2Kwkb29wHDj341r5ydvXjs/mUSavv13Ui93/dr5yaJo8bwtjUxayfMbWtR76b2IiVpt+kyeH5079eHo7NlzL5w4NXF8+vj06fEjRw4e2DNwePxQV+LM4rq+65OZ3Ttff/fym5NHL7//87dZe7fm+5vj6JbhxtFt6eluV9Zj25rSSaWHDaEj5YjITle13v8Hoxybbu0bjNc+62njgDWVpqW01ftz7mIK3MOy0TzQj4o3+uz+t9jWaehxV7j6cuMGKIv7Rr419lSilJepLri/7abhiDh68Z+vsi3WaB4CAKDZlWz883yr8V8pHmoqd1++hjIUEfdHxPaIeCAidkTEgxH1sg9HxCMd1r9whWTx+CcdXFFgy5SN/17K17ZuH/8Vo78YKue5bfX4q8mxE7Xp/fkx2RfVDVl+bIk6fnj1ty/a7Wse/2VbVn8xFszb8VdlwQTd1MTcxGpibnb104hdlVbxJ1Es4yQRsTMidq2wjhPPfrO73b47x7+ELqwzpV9HPNM4/xdjQfyFm2l6ofX65NiLh8cPjW6M2vT+0eKqWOyXXy+91a7+VcXfBVevpLG55fVfxJ/8m2yMmD177mR9vXa28zou/fF523ualV7/A8k79fRA/tjHE3NzZ8YiBpI3Fj8+Pv/cIl+Uz67/fXtb9//tMX8kHo2I7CLeExGPRcTjedufiIgnI2LvEvH/9MpTH3Qe/xKz8l2UxT+15PmPoSw1f/47T5RP/vhd5/EXsvN/sJ7alz+ynNe/5TZwNccOAAAA/i9K9c/AJ6WRW+lSaWSk8Rn+HbG5VJuZnXvu2MxHp6can5UfimqpmOkabJoPHcvnhov8+IL8gXze+Mvypnp+ZHKmNtXr4KHPbWnT/zN/lnvdOmDN+b4W9C/9H/qX/g/9S/+H/qX/Q/9q1f8v9KAdwPq7w/v/pvVqB7D+jP+hf+n/0L/0f+hLbb8bX1rVV/4lepT4fmB1v9Ww/ESU7pKQ75lENVruqiz7xyxWmNjQclevX5kAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC6478AAAD//yVS5pE=") 17:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2945.872841][T28935] i_nlink=1 [ 2945.885504][T28933] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2945.908221][T28940] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2945.924650][T28933] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 17:00:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2945.962709][T28940] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2945.976598][T28933] ext4_test_bit(bit=14, block=4) = 1 [ 2945.981946][T28933] is_bad_inode(inode)=0 [ 2945.986112][T28933] NEXT_ORPHAN(inode)=0 [ 2945.990217][T28933] max_ino=32 [ 2945.993476][T28933] i_nlink=1 17:00:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2946.014062][T28957] loop2: detected capacity change from 0 to 512 [ 2946.034896][T28960] loop4: detected capacity change from 0 to 512 [ 2946.041270][T28957] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2946.051912][T28957] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 17:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPDv+pG+f8mvlEdLC4GCqHgkTfqgBy4gkDiAhASHIk4hSatSt0FNkGhVQeFQjqgSd8QRib+AC+WCgBMSV5A4IqQK5dLChUVr7zZuYqdx4sSl/nykTWa8Y818d3fs2RnbAfSt4exPErE9In6JiMFG9tYCw41/N+YvTv41f3EyiTR9/c+kXu76/MXJomjxvG2NTFrJ85ta1Hv5rYiJWm36XJ4fnTvz7ujs+QvPnDozcXL65PTZ8WPHDh/aN3B0/EhX4sziur7ng5m9u19+88qrk8evvP3DV1l7t+f7m+PoluHG0W3p8W5X1mM7mtJJpYcNoSPliMhOV7Xe/wejHFtu7huMlz7uaeOAdZWmpbTV+3PuUgrcxbLRPNCPijf67P632DZo6HFHuPZ84wYoi/tGvjX2VKKUl6kuur/tpuGIOH7p78+zLdZpHgIAoNnVbPzzdKvxXynuayr3v3wNZSgi/h8ROyPinojYFRH3RtTL3h8RD3RY/+IVkqXjn3RwVYGtUDb+ey5f27p1/FeM/mKonOd21OOvJidO1aYP5sfkQFQ3ZfmxZer49sWfP223r3n8l21Z/cVYMG/HH5VFE3RTE3MTa4m52bWPIvZUWsWfRLGMk0TE7ojYs8o6Tj355d52+24f/zK6sM6UfhHxROP8X4pF8Rd+S9O09frk2LNHx4+Mbo7a9MHR4qpY6sefLr/Wrv41xd8F166msbXl9V/En/yTbI6YPX/hdH29drbzOi7/+knbe5rVXv8DyRv19ED+2PsTc3PnxiIGkleWPj6+8NwiX5TPrv8D+1v3/52xcCQejIjsIt4XEQ9FxMN52x+JiEcjYv8y8X//wmPvdB7/MrPyXZTFP7Xs+Y+hLLVw/jtPlE9/93Xn8Rey83+4njqQP7KS17+VNnAtxw4AAAD+K0r1z8AnpZGb6VJpZKTxGf5dsbVUm5mde+rEzHtnpxqflR+KaqmY6Rpsmg8dy+eGi/z4ovyhfN74s/KWen5kcqY21evgoc9ta9P/M7+Xe906YN35vhb0L/0f+pf+D/1L/4f+pf9D/2rV/z/sQTuAjXeb9/8tG9UOYOMZ/0P/0v+hf+n/0Jfafje+tKav/Ev0KPHNwNp+q2HliSjdISHfNYlqtNxVWfGPWawysanlrl6/MgEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHTHvwEAAP//xMDm+Q==") 17:00:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPCv13b6/qW/Uh4tLQQKouKRNOmDHriAQOIAEhIcijiFJK1C3QY1QaJVBIFDOKJK3BFHJP4CLpQLAk5IXOGOkCKUSwsno7V3Ezex0zhx4lJ/PtImM96xZr67O/bsjO0AetZA+qcQsTcifouI/nr29gID9X+3FmfH/l6cHStEtfrmX4VauZuLs2N50fx5e+qZainL72hS7/w7EaOVysSVLD80c+n9oemr156bvDR6YeLCxOWRs2dPnTzad2bkdEfiTOO6efijqSOHXn37+utj566/+9M3aXv3Zvsb4+iUgfrRberJTlfWZfsa0oVSFxtCW4oRkZ6ucq3/90cxdi3t649XPu1q44AtVa0m1Wbvz5m5KnAPS0fzQC/K3+jT+99826ahx11h4cX6DVAa961sq+8pRZKVKa+4v+2kgYg4N/fPl+kWWzQPAQDQ6EY6/nm22fgviQcayv0vW0PZHxH/j4gDEXFfRByMiPsjamUfjIiH2qx/5QrJ6vFPtX9Dga1TOv57IVvbun38lyw1sZjl9tXiLxfOT1YmTmTH5HiUd6T54TXq+P7lXz9vta9x/Jduaf35WDBrx5+lFRN046Mzo5uJudHCJxGHS83iL0S+jFOIiEMRcXiDdUw+/fWRVvvuHP8aOrDOVP0q4qn6+Z+LFfHnCi3XJ4efPzNyemhnVCZODOVXxWo//zL/Rqv6NxV/ByzcqMbuptd/Q/w7I6avXrtYW6+dbr+O+d8/a3lPs9Hrv6/wVi3dlz324ejMzJXhiL7Ca6sfH1l+bp7Py6fX//Fjzfv/gVg+Eg9HRHoRH42IRyLi0aztj0XE4xFxbI34f3zpiffaj3+NWfkOSuMfX/v8709Ty+e//UTx4g/fth9/Lj3/p2qp49kj63n9W28DN3PsAAAA4L8iqX0GvpAMLqWTZHCw/hn+g7E7qUxNzzxzfuqDy+P1z8rvj3KSz3T1N8yHDmdzw3l+ZEX+ZDZv/EVxVy0/ODZVGe928NDj9rTo/6k/it1uHbDlfF8Lepf+D71L/4fepf9D79L/oXc16/8fd6EdwPa7w/v/ru1qB7D9jP+hd+n/0Lv0f+hJLb8bn2zqK/8SXUp817e532pYfyKSuyTkeyZRjqa7Suv+MYsNJnY03dXtVyYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDO+DcAAP//qhPiLg==") 17:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2946.068329][T28960] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2946.080261][T28966] loop0: detected capacity change from 0 to 512 [ 2946.088602][T28957] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2946.101195][T28966] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2946.102576][T28960] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 17:00:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2946.145689][T28966] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2946.151068][T28960] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2946.164479][T28976] loop5: detected capacity change from 0 to 512 [ 2946.177111][T28957] ext4_test_bit(bit=14, block=4) = 1 [ 2946.186152][T28957] is_bad_inode(inode)=0 17:00:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2946.189501][T28966] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2946.190318][T28957] NEXT_ORPHAN(inode)=0 [ 2946.202505][T28957] max_ino=32 [ 2946.204083][T28976] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2946.205692][T28957] i_nlink=1 [ 2946.205774][T28960] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) 17:00:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2946.272572][T28982] loop3: detected capacity change from 0 to 512 [ 2946.279578][T28976] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2946.287794][T28976] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2946.305512][T28982] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2946.305760][T28976] ext4_test_bit(bit=14, block=4) = 1 17:00:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2946.316405][T28987] loop0: detected capacity change from 0 to 512 [ 2946.319036][T28976] is_bad_inode(inode)=0 [ 2946.319044][T28976] NEXT_ORPHAN(inode)=0 [ 2946.319049][T28976] max_ino=32 [ 2946.319054][T28976] i_nlink=1 [ 2946.331871][T28990] loop2: detected capacity change from 0 to 512 [ 2946.349028][T28990] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2946.357843][T28993] loop4: detected capacity change from 0 to 512 [ 2946.361649][T28987] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2946.373946][T28990] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2946.383752][T28993] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2946.384280][T28982] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2946.393212][T28990] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2946.411012][T28990] ext4_test_bit(bit=14, block=4) = 1 [ 2946.416347][T28990] is_bad_inode(inode)=0 17:00:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2946.417004][T28982] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2946.420536][T28990] NEXT_ORPHAN(inode)=0 [ 2946.437548][T28990] max_ino=32 [ 2946.440833][T28990] i_nlink=1 [ 2946.442099][T28993] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2946.458372][T28999] loop5: detected capacity change from 0 to 512 17:00:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x0, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2946.465441][T28993] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2946.481364][T28982] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2946.494394][T28987] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2946.513350][T28999] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 17:00:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2946.522066][T28987] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2946.531579][T28993] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2946.531996][T29003] loop2: detected capacity change from 0 to 512 [ 2946.559994][T29003] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem 17:00:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2946.581578][T28999] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2946.588362][T29003] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2946.591173][T28999] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2946.598355][T29003] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2946.618441][T28999] ext4_test_bit(bit=14, block=4) = 1 [ 2946.618454][T28999] is_bad_inode(inode)=0 [ 2946.618459][T28999] NEXT_ORPHAN(inode)=0 17:00:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x0, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2946.618464][T28999] max_ino=32 [ 2946.618470][T28999] i_nlink=1 [ 2946.650292][T29003] ext4_test_bit(bit=14, block=4) = 1 [ 2946.655600][T29003] is_bad_inode(inode)=0 [ 2946.659821][T29003] NEXT_ORPHAN(inode)=0 [ 2946.663885][T29003] max_ino=32 [ 2946.667077][T29003] i_nlink=1 [ 2946.682819][T29108] loop5: detected capacity change from 0 to 512 [ 2946.699524][T29108] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2946.708852][T29115] loop0: detected capacity change from 0 to 512 [ 2946.716703][T29115] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem 17:00:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x0, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2946.729129][T29113] loop3: detected capacity change from 0 to 512 [ 2946.745782][T29113] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2946.758939][T29121] loop4: detected capacity change from 0 to 512 [ 2946.767455][T29108] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2946.775911][T29115] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2946.777675][T29108] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2946.792143][T29115] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2946.800960][T29108] ext4_test_bit(bit=14, block=4) = 1 [ 2946.814431][T29108] is_bad_inode(inode)=0 [ 2946.814530][T29121] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2946.818561][T29108] NEXT_ORPHAN(inode)=0 17:00:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x0, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2946.818569][T29108] max_ino=32 [ 2946.818575][T29108] i_nlink=1 [ 2946.837765][T29113] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2946.859986][T29121] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2946.861697][T29113] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature 17:00:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x0, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBv/UjfpJTyaGkhUBAVj6RJH/TABQQSB5CQ4FDEKSRpFeo2qAkSrSIIHMIRVeKOOCLxF3ChXBBwQuIKd4QUoVxauGC09m7jJnYaJ05c6t9P2mTGO9bMt7tjz87YDqBnDaR/kojdEfFbRPTXs7cWGKj/u7E4O/b34uxYEtXqm38ltXLXF2fH8qL583bVM9VSlt/WpN75dyJGK5WJS1l+aObC+0PTl688N3lh9NzEuYmLI6dPnzh+uO/UyMmOxJnGdf3gR1OHDrz69tXXx85cffenb9L27s72N8bRKQP1o9vUk52urMv2NKSTUhcbQluKEZGernKt//dHMXbc3Ncfr3za1cYBm6paLVSbvT9n5qrAXSwdzQO9KH+jT+9/822Lhh53hIUX6zdAadw3sq2+pxSFrEx52f1tJw1ExJm5f75Mt9ikeQgAgEbX0vHPs83Gf4V4oKHcPdkayt6IuDci9kXEfRGxPyLuj6iVfTAiHmqz/uUrJCvHP9X+dQW2Run474VsbevW8V8++kv+LWa5PbX4y8nZycrEseyYHI3ytjQ/vEod37/86+et9jWO/9ItrT8fC2bt+LO0bIJufHRmdENBN1j4JOJgqVn8SeTLOElEHIiIg+usY/Lprw+12nf7+FfRgXWm6lcRT9XP/1wsiz+XtFyfHH7+1MjJoe1RmTg2lF8VK/38y/wbrerfUPwdsHCtGjubXv8N8W+PmL585XxtvXa6/Trmf/+s5T3Neq//vuStWrove+zD0ZmZS8MRfclrKx8fWXpuns/Lp9f/0SPN+/++WDoSD0dEehEfjohHIuLRrO2PRcTjEXFklfh/fOmJ99qPf5VZ+Q5K4x9f/fzvTVNL57/9RPH8D9+2H38uPf8naqmj2SNref1bawM3cuwAAADg/6JQ+wx8Uhi8mS4UBgfrn+HfHzsLlanpmWfOTn1wcbz+Wfm9US7kM139DfOhw9nccJ4fWZY/ns0bf1HcUcsPjk1VxrsdPPS4XS36f+qPYrdbB2w639eC3qX/Q+/S/6F36f/Qu/R/6F3N+v/HXWgHsPVu8/6/Y6vaAWw943/oXfo/9C79H3pSy+/GFzb0lX+JLiW+69vYbzWsPRGFOyTkuyZRjqa7Smv+MYt1JrY13dXtVyYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIDO+C8AAP//vUbjDQ==") [ 2946.873283][T29121] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2946.891601][T29127] loop2: detected capacity change from 0 to 512 [ 2946.902897][T29121] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2946.915297][T29113] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) 17:00:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBv13b6JqGUR0sLgYKoeCRN+qAHLiCQOICEBIciTiFJq1K3QU2QaFVB4VCOqBJ3xBGJv4AL5YKAExJXuCOkCuXSwgWjtXcbN7HTOHHiUv9+0iYz3rFmvt0de3bGdgB9azj7k0Rsj4jfImKwkb21wHDj3435i5N/z1+cTKJWe/OvpF7u+vzFyaJo8bxtjUytnOc3taj38jsRE9Xq9Lk8Pzp35v3R2fMXnjt1ZuLk9Mnps+PHjh0+tG/g6PiRrsSZxXV9z0cze3e/+vaV1yePX3n3p2+y9m7P9zfH0S3DjaPb0pPdrqzHdjSlk3IPG0JHShGRna5Kvf8PRim23Nw3GK982tPGAeuqVktrrd6fc5dqwF0sG80D/ah4o8/uf4ttg4Yed4RrLzZugLK4b+RbY0850rxMZdH9bTcNR8TxS/98mW2xTvMQAADNrmbjn2dbjf/SeKCp3D35GspQRNwbETsj4r6I2BUR90fUyz4YEQ91WP/iFZKl45/a4KoCW6Fs/PdCvrZ16/ivGP3FUCnP7ajHX0lOnKpOH8yPyYGobMryY8vU8f3Lv37ebl/z+C/bsvqLsWDejj/LiybopibmJtYSc7Nrn0TsKbeKP4liGSeJiN0RsWeVdZx6+uu97fbdPv5ldGGdqfZVxFON838pFsVfSNquT449f3T8yOjmqE4fHC2uiqV+/uXyG+3qT9cSfxdcu1qLrS2v/yL+5N9kc8Ts+Qun6+u1s53Xcfn3z9re06z2+h9I3qqnB/LHPpyYmzs3FjGQvLb08fGF5xb5onx2/R/Y37r/74yFI/FwRGQX8b6IeCQiHs3b/lhEPB4R+5eJ/8eXnniv8/iXmZXvoiz+qWXPfwxlqYXz33midPqHbzuPv5Cd/8P11IH8kZW8/q20gWs5dgAAAPB/kdY/A5+kIzfTaToy0vgM/67YmlZnZueeOTHzwdmpxmflh6KSFjNdg03zoWP53HCRH1+UP5TPG39R2lLPj0zOVKd6HTz0uW1t+n/mj1KvWwesO9/Xgv6l/0P/0v+hf+n/0L/0f+hfrfr/xz1oB7DxbvP+v2Wj2gFsPON/6F/6P/Qv/R/6Utvvxqdr+sq/RI8S3w2s7bcaVp6I9A4J+a5JVKLlrvKKf8xilYlNLXf1+pUJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACgO/4LAAD//7e/4v8=") 17:00:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBv/UjfJJTyaGkhUBAVj6RJH/TABQQSB5CQ4FDEKSRpVeo2qAkSrSIIHMIRVeKOOCLxF3ChXBBwQuIKd4QUoVzacjJaezd1UzuJEycu9e8nbTLjWWvm292xZ2dsB9CzBtM/ScTuiPgjIvrr2dt3GKz/u7E4O35zcXY8iWr17X+S2n7XF2fH813z5+2qZ6qlLL+tSb3z70WMVSqTl7L88MyFD4enL1954dyFsbOTZycvjp46dfzYob6Toyc6Emca1/UDn0wd3P/6u1ffHD999f1fvkvbuzsrb4yjUwbrR7eppztdWZftaUgnpS42hLYUIyI9XeVa/++PYuxYKuuP1z7vauOATVWtFqrN3p9ritWbVeAelo7mgV6Uv9Wn97/5tmWDj7vAwsv1G6A07hvZVi8pRSHbp7zs/raTBiPi9Ny/X6dbbNI8BABAo2vp+Of5ZuO/QjzUsN992RrKQETcHxF7I+KBiNgXEQ9G1PZ9OCIeabP+5Sskd45/qv3rCmyN0vHfS9na1u3jv3z0FwPFLLenFn85OXOuMnk0OyZHorwtzY+sUMePr/7+ZauyxvFfuqX152PBrB1/l5ZN0E2MzYxtJOZGC59FHCg1iz+JfBkniYj9EXFgnXWce/bbg63KVo9/BR1YZ6p+E/FM/fzPxbL4c0nL9cmRF0+OnhjeHpXJo8P5VXGnX3+bf6tV/RuKvwMWrlVjZ9Prfyn+gWR7xPTlK+dr67XT7dcx/+cXLe9p1nv99yXv5Nm59M/HYzMzl0Yi+pI3ag/2ZYW1x0dvPTfP5/un1/+Rw837/964dSQejYj0Ij4UEY9FxONZ25+IiCcj4vAK8f/8ylMftB9/y1n5jkrjn1jt/Efj+W8/UTz/0/ftx59Lz//xWupI9shaXv/W2sCNHDsAAAD4vyjUPgOfFIaW0oXC0FD9M/z7YmehMjU989yZqY8uTtQ/Kz8Q5UI+09XfMB86ks0N5/nRZflj2bzxV8UdtfzQ+FRlotvBQ4/b1aL/p/4qdrt1wKbzfS3oXfo/9C79H3qX/g+9S/+H3tWs/3/ahXYAW2+V9/8dW9UOYOsZ/0Pv0v+hd+n/0JNafje+sKGv/Et0KfFD38Z+q2HtiSjcJSHfM4lyNC0qrfnHLNaZ2Na0qNuvTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJ3xXwAAAP//d4TkIg==") [ 2946.940765][T29127] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2946.975458][T29133] loop5: detected capacity change from 0 to 512 [ 2946.976201][T29134] loop0: detected capacity change from 0 to 512 17:00:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x0, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2946.989584][T29127] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2946.998564][T29127] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2947.012183][T29133] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2947.030013][T29134] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2947.048350][T29127] ext4_test_bit(bit=14, block=4) = 1 [ 2947.052440][T29140] loop4: detected capacity change from 0 to 512 [ 2947.053727][T29127] is_bad_inode(inode)=0 [ 2947.064121][T29127] NEXT_ORPHAN(inode)=0 [ 2947.064592][T29134] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2947.068163][T29127] max_ino=32 [ 2947.068171][T29127] i_nlink=1 [ 2947.090758][T29133] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 17:00:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2947.094727][T29143] loop3: detected capacity change from 0 to 512 [ 2947.102866][T29140] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2947.106561][T29143] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2947.121734][T29134] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2947.122570][T29133] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 17:00:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2947.148232][T29140] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2947.162376][T29133] ext4_test_bit(bit=14, block=4) = 1 [ 2947.167679][T29133] is_bad_inode(inode)=0 [ 2947.171362][T29143] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2947.171843][T29133] NEXT_ORPHAN(inode)=0 [ 2947.183861][T29133] max_ino=32 [ 2947.187083][T29133] i_nlink=1 17:00:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2947.189736][T29140] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large 17:00:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPCvX2nTxy/5lfJoaCFQEBGPpEkf9MAFBBIHkJDgUMQpJGkV6jaoCRKtIggcwhFV4o44IvEXcKFcEHBC4gp3hBShXFo4Ga29m7iJncaJE5f685E2mfGONfPd3bFnZ2wH0LUGkz+5iAMR8VtE9NWytxcYrP27tTw/8ffy/EQuKpU3/8pVy91cnp/IimbP21/LVIppfk+DehffiRgvl6eupPmRuUvvj8xevfbc9KXxC1MXpi6PnT176uSxnjNjp9sSZxLXzYGPZo4eefXt669PnLv+7k/fJO09kO6vj6NdBmtHt6En211Zhx2sS+eKHWwILSlERHK6StX+3xeF6F3Z1xevfNrRxgE7qlLJVxq9P6cWKsA9LBnNA90oe6NP7n+zbZeGHneFpRdrN0BJ3LfSrbanGPm0TGnN/W07DUbEuYV/vky22KF5CACAejeS8c+zjcZ/+Xigrtz/0jWU/oj4f0Qcioj7IuJwRNwfUS37YEQ81GL9a1dI1o9/Kn1bCmyTkvHfC+na1u3jv9roLxkjF9LcwWr8pdz56fLUifSYDEVpT5If3aCO71/+9fNm++rHf8mW1J+NBdN2/FlcM0E3OT43vs2wVyx9EjFQbBR/LrJlnFxEHImIgS3WMf3010eb7btz/BtowzpT5auIp2rnfyHWxJ/JNV2fHH3+zNjpkb1Rnjoxkl0V6/38y+IbzerfVvxtsHSjEvsaXv918e+NmL167WJ1vXa29ToWf/+s6T3NVq//ntxb1XRP+tiH43NzV0YjenKvrX98bPW5WT4rn1z/Q8cb9/9DsXokHo6I5CI+FhGPRMSjadsfi4jHI+L4BvH/+NIT77Ue/waz8m2UxD+58fnvT1Kr57/1ROHiD9+2Hn8mOf+nqqmh9JHNvP5ttoHbOXYAAADwX5GvfgY+lx9eSefzw8O1z/Afjn358szs3DPnZz64PFn7rHx/lPLZTFdf3XzoaDo3nOXH1uRPpvPGXxR6q/nhiZnyZKeDhy63v0n/T/xR6HTrgB3n+1rQvfR/6F76P3Qv/R+6l/4P3atR//+4A+0Adt8d3v97d6sdwO4z/ofupf9D99L/oSs1/W58fltf+ZfoUOK7nu39VsPmE5G/S0K+ZxKlaLiruOkfs9hiYk/DXZ1+ZQIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGiPfwMAAP//ZZDmCg==") [ 2947.221460][T29150] loop0: detected capacity change from 0 to 512 [ 2947.229109][T29143] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2947.241213][T29150] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2947.251485][T29140] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2947.266183][T29154] loop2: detected capacity change from 0 to 512 [ 2947.267014][T29143] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2947.291105][T29150] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2947.294112][T29154] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem 17:00:07 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2947.316628][T29157] loop5: detected capacity change from 0 to 512 [ 2947.325654][T29154] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2947.333289][T29150] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2947.348843][T29157] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 17:00:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:07 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x0, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2947.370522][T29154] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2947.387657][T29157] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2947.417305][T29157] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2947.424353][T29169] loop3: detected capacity change from 0 to 512 [ 2947.434789][T29171] loop0: detected capacity change from 0 to 512 [ 2947.437665][T29170] loop4: detected capacity change from 0 to 512 [ 2947.444287][T29171] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2947.447656][T29154] ext4_test_bit(bit=14, block=4) = 1 [ 2947.456792][T29169] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2947.460783][T29154] is_bad_inode(inode)=0 [ 2947.460791][T29154] NEXT_ORPHAN(inode)=0 [ 2947.460798][T29154] max_ino=32 [ 2947.460804][T29154] i_nlink=1 [ 2947.469023][T29157] ext4_test_bit(bit=14, block=4) = 1 [ 2947.482393][T29170] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2947.483450][T29157] is_bad_inode(inode)=0 [ 2947.498989][T29170] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2947.501225][T29157] NEXT_ORPHAN(inode)=0 [ 2947.513462][T29157] max_ino=32 17:00:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:07 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x0, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2947.514603][T29170] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2947.516641][T29157] i_nlink=1 [ 2947.531223][T29169] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2947.543896][T29171] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2947.566542][T29170] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2947.569735][T29169] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2947.593668][T29169] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2947.598650][T29171] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 17:00:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBv/UjfJJTyaGkhUBAVj6RJH/TABQQSB5CQ4FDEKSRpVeo2qAkSrSooHMIRVeKOOCLxF3ChXBBwQuIKd4QUoVxauGC09m7jJrYbJ05c6t9P2mTGO9bMt7tjz87YDqBvDad/koidEfFbRAzWs7cWGK7/u7F4efLvxcuTSVSrb/6V1MpdX7w8mRfNn7ejnqmWsvyWJvXOvxMxUalMX8jyo3Pn3h+dvXjpuTPnJk5Pn54+P37ixNEjBwaOjx/rSpxpXNf3fTSzf++rb199ffLk1Xd/+iZt785sf2Mc3TJcP7pNPdntynpsV0M6KfWwIXSkGBHp6SrX+v9gFGPbzX2D8cqnPW0csKGq1UK12ftz5koVuIulo3mgH+Vv9On9b75t0tDjjrDwYv0GKI37RrbV95SikJUpL7u/7abhiDh55Z8v0y02aB4CAKDRtXT882yz8V8hHmgod0+2hjIUEfdGxO6IuC8i9kTE/RG1sg9GxEMd1r98hWTl+Kc6uKbAVikd/72QrW3dOv7LR38xVMxyu2rxl5NTZyrTh7NjcijKW9L8WJs6vn/5189b7Wsc/6VbWn8+Fsza8Wdp2QTd1MTcxHpibrTwScS+UrP4k8iXcZKI2BsR+9ZYx5mnv97fat/t42+jC+tM1a8inqqf/yuxLP5c0nJ9cuz54+PHRrdGZfrwaH5VrPTzL/NvtAthzfF3wcK1amxvev3n8Sf/JlsjZi9eOltbr53tvI753z9reU+z1ut/IHmrlh7IHvtwYm7uwljEQPLaysfHl56b5/Py6fV/6GDz/r87lo7EwxGRXsQHIuKRiHg0a/tjEfF4RBxsE/+PLz3xXufxt5mV76I0/qm25z+G0tTS+e88UTz7w7edx59Lz//RWupQ9shqXv9W28D1HDsAAAD4vyjUPgOfFEZupguFkZH6Z/j3xPZCZWZ27plTMx+cn6p/Vn4oyoV8pmuwYT50LJsbzvPjy/JHsnnjL4rbavmRyZnKVK+Dhz63o0X/T/1R7HXrgA3n+1rQv/R/6F/6P/Qv/R/6l/4P/atZ//+4B+0ANt9t3v+3bVY7gM1n/A/9S/+H/qX/Q19q+d34wrq+8i/Ro8R3A+v7rYbVJ6Jwh4R81yTK0XRXadU/ZrHGxJamu3r9ygQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANAd/wUAAP//dTfjAQ==") 17:00:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2947.635466][T29179] loop2: detected capacity change from 0 to 512 [ 2947.650899][T29180] loop5: detected capacity change from 0 to 512 [ 2947.666641][T29180] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2947.674952][T29179] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem 17:00:07 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x0, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2947.689980][T29183] loop0: detected capacity change from 0 to 512 [ 2947.703352][T29183] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2947.707908][T29180] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2947.721033][T29180] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2947.722465][T29179] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2947.743618][T29180] ext4_test_bit(bit=14, block=4) = 1 [ 2947.748999][T29180] is_bad_inode(inode)=0 [ 2947.753264][T29180] NEXT_ORPHAN(inode)=0 [ 2947.757323][T29180] max_ino=32 [ 2947.760563][T29180] i_nlink=1 [ 2947.768264][T29179] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2947.786758][T29192] loop4: detected capacity change from 0 to 512 17:00:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:07 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2947.793755][T29183] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2947.796171][T29193] loop3: detected capacity change from 0 to 512 [ 2947.811418][T29179] ext4_test_bit(bit=14, block=4) = 1 [ 2947.817495][T29193] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2947.819740][T29179] is_bad_inode(inode)=0 [ 2947.829094][T29193] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2947.831999][T29179] NEXT_ORPHAN(inode)=0 [ 2947.832007][T29179] max_ino=32 [ 2947.832013][T29179] i_nlink=1 [ 2947.854024][T29192] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2947.862371][T29183] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2947.881560][T29193] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature 17:00:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:07 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2947.895781][T29192] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2947.909128][T29200] loop5: detected capacity change from 0 to 512 [ 2947.916850][T29200] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2947.926527][T29193] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2947.932773][T29200] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2947.947651][T29192] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2947.959084][T29207] loop2: detected capacity change from 0 to 512 [ 2947.969929][T29207] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2947.979718][T29207] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2947.982174][T29209] loop0: detected capacity change from 0 to 512 17:00:07 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2947.988834][T29192] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2947.999110][T29200] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2948.006375][T29207] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2948.033632][T29207] ext4_test_bit(bit=14, block=4) = 1 [ 2948.039027][T29207] is_bad_inode(inode)=0 17:00:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2948.043293][T29207] NEXT_ORPHAN(inode)=0 [ 2948.047360][T29207] max_ino=32 [ 2948.047559][T29200] ext4_test_bit(bit=14, block=4) = 1 [ 2948.050553][T29207] i_nlink=1 [ 2948.053064][T29209] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2948.055855][T29200] is_bad_inode(inode)=0 [ 2948.055863][T29200] NEXT_ORPHAN(inode)=0 [ 2948.055869][T29200] max_ino=32 [ 2948.055876][T29200] i_nlink=1 17:00:07 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPDv+pG+f+mvlEdLC4GCiHgkTfqgBy4gkDiAhASHIk4hSatQt0FNkGgVQeAQjqgSd8QRib+AC+WCgBMSV7gjpAjl0sLJaO3dxk3sNE6cuNSfj7TJjHesme/ujj07YzuAnjWQ/kki9kbEbxHRX8/eXmCg/u/m0tz430tz40lUq2/+ldTK3ViaG8+L5s/bU89US1l+R5N6F96JGKtUJi9n+eHZi+8Pz1y5+tzUxbHzk+cnL42eOXPyxNG+06OnOhJnGteNwx9NHzn06tvXXh8/e+3dn75J27s3298YR6cM1I9uU092urIu29eQTkpdbAhtKUZEerrKtf7fH8XYdWtff7zyaVcbB2yparVQbfb+nJmvAvewdDQP9KL8jT69/823bRp63BUWX6zfAKVx38y2+p5SFLIy5RX3t500EBFn5//5Mt1ii+YhAAAaXU/HP882G/8V4oGGcv/L1lD2R8T/I+JARNwXEQcj4v6IWtkHI+KhNutfuUKyevxT7d9QYOuUjv9eyNa2bh//5aO/SIpZbl8t/nJybqoyeTw7JoNR3pHmR9ao4/uXf/281b7G8V+6pfXnY8GsHX+WVkzQTYzNjm0m5kaLn0QcLjWLP4l8GSeJiEMRcXiDdUw9/fWRVvvuHP8aOrDOVP0q4qn6+Z+PFfHnkpbrkyPPnx49NbwzKpPHh/OrYrWff1l4o1X9m4q/AxavV2N30+u/If6dETNXrl6ordfOtF/Hwu+ftbyn2ej135e8VUv3ZY99ODY7e3kkoi95bfXjo8vPzfN5+fT6HzzWvP8fiOUj8XBEpBfx0Yh4JCIezdr+WEQ8HhHH1oj/x5eeeK/9+NeYle+gNP6Jtc///jS1fP7bTxQv/PBt+/Hn0vN/spYazB5Zz+vfehu4mWMHAAAA/xWF2mfgk8LQrXShMDRU/wz/wdhdqEzPzD5zbvqDSxP1z8rvj3Ihn+nqb5gPHcnmhvP86Ir8iWze+Ivirlp+aHy6MtHt4KHH7WnR/1N/FLvdOmDL+b4W9C79H3qX/g+9S/+H3qX/Q+9q1v8/7kI7gO13h/f/XdvVDmD7Gf9D79L/oXfp/9CTWn43vrCpr/xLdCnxXd/mfqth/Yko3CUh3zOJcjTdVVr3j1lsMLGj6a5uvzIBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB0xr8BAAD//2hI4g8=") 17:00:07 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2948.087592][T29209] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2948.103534][T29209] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 17:00:07 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2948.148704][T29218] loop3: detected capacity change from 0 to 512 [ 2948.180722][T29218] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2948.199315][T29224] loop0: detected capacity change from 0 to 512 [ 2948.217715][T29218] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2948.217748][T29231] loop5: detected capacity change from 0 to 512 [ 2948.228334][T29232] loop2: detected capacity change from 0 to 512 [ 2948.241372][T29232] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem 17:00:08 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2948.246998][T29224] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2948.250392][T29218] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2948.273403][T29218] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2948.285715][T29231] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 17:00:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2948.287675][T29224] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2948.308745][T29224] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2948.311528][T29232] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2948.332732][T29232] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 17:00:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:08 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2948.356527][T29232] ext4_test_bit(bit=14, block=4) = 1 [ 2948.361896][T29232] is_bad_inode(inode)=0 [ 2948.366052][T29232] NEXT_ORPHAN(inode)=0 [ 2948.370176][T29232] max_ino=32 [ 2948.370765][T29231] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2948.373356][T29232] i_nlink=1 [ 2948.386090][T29242] loop0: detected capacity change from 0 to 512 [ 2948.403485][T29242] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2948.410880][T29246] loop3: detected capacity change from 0 to 512 [ 2948.419988][T29246] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2948.427451][T29231] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 17:00:08 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2948.454805][T29246] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2948.459618][T29231] ext4_test_bit(bit=14, block=4) = 1 [ 2948.464068][T29246] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2948.468054][T29231] is_bad_inode(inode)=0 [ 2948.468062][T29231] NEXT_ORPHAN(inode)=0 [ 2948.468067][T29231] max_ino=32 [ 2948.468072][T29231] i_nlink=1 17:00:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:08 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, 0x0, &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2948.479423][T29242] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2948.499195][T29252] loop2: detected capacity change from 0 to 512 [ 2948.518142][T29246] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2948.518646][T29252] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2948.548488][T29242] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 17:00:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2948.567633][T29259] loop5: detected capacity change from 0 to 512 [ 2948.567900][T29252] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2948.583778][T29260] loop4: detected capacity change from 0 to 512 [ 2948.584165][T29259] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2948.595844][T29260] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem 17:00:08 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, 0x0, &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3LtvHEUYAPBv7+G8sQnhkZCAISAiHnbsPEhBAwKJAiQkKIKojO1EIZcYxUYikQWGwpQoEj2iROIvoCE0CKiQaKFHSBZyk0DDob3bjS/2neOzz76Q+/2kTWZuxpr5dnd8szO+C6BnDab/JBG7I+K3iOivZ2+tMFj/78bi7Pjfi7PjSVSrb/6V1OpdX5wdz6vmP7ernqmWsvy2Ju3OvxMxVqlMXsrywzMX3h+evnzluXMXxs5Onp28OHrq1PFjh/pOjp7oSJxpXNcPfDR1cP+rb199ffz01Xd/+ibt7+6svDGOThmsn92mnux0Y122pyGdlLrYEdpSjIj0cpVr478/irHjZll/vPJpVzsHbKpqtVBt9v6cmasCd7F0Ng/0ovyNPn3+zY8tmnrcERZerD8ApXHfyI56SSkKWZ3ysufbThqMiNNz/3yZHrFJ6xAAAI2upfOfZ5vN/wrxQEO9e7I9lIGIuDci9kbEfRGxLyLuj6jVfTAiHmqz/eU7JCvnP9X+dQW2Run874Vsb+vW+V8++4uBYpbbU4u/nJw5V5k8mp2TI1HeluZHVmnj+5d//bxVWeP8Lz3S9vO5YNaPP0vLFugmxmbGNhJzo4VPIg6UmsWfRL6Nk0TE/og4sM42zj399cFWZbePfxUd2GeqfhXxVP36z8Wy+HNJy/3JkedPjp4Y3h6VyaPD+V2x0s+/zL/Rqv3dG4m/AxauVWNn0/s/jz/5N9keMX35yvnafu10+23M//5Zy2ea9d7/fclbtXRf9tqHYzMzl0Yi+pLXVr4+uvSzeT6vn97/Rw43H/97Y+lMPBwR6U18KCIeiYhHs74/FhGPR8ThVeL/8aUn3ms//lVW5TsojX9i1esfA2lq6fq3nyie/+Hb9uPPpdf/eC11JHtlLb//1trBjZw7AAAA+L8o1NagksLQzXShMDRU/xv+fbGzUJmannnmzNQHFyfqa1UDUS7kK139DeuhI9nacJ4fXZY/lq0bf1HcUcsPjU9VJrodPPS4XS3Gf+qPYrd7B2w6n9eC3mX8Q+8y/qF3Gf/Qu4x/6F3Nxv/HXegHsPVu8/6/Y6v6AWw983/oXcY/9C7jH3pSy8/GFzb0kX+JLiW+69vYdzWsPRGFOyTkuyZRjqZFpTV/mcU6E9uaFnX7NxMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEBn/BcAAP//awjjCQ==") [ 2948.612297][T29252] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2948.623110][T29252] ext4_test_bit(bit=14, block=4) = 1 [ 2948.628462][T29252] is_bad_inode(inode)=0 [ 2948.632659][T29252] NEXT_ORPHAN(inode)=0 [ 2948.636720][T29252] max_ino=32 [ 2948.639933][T29252] i_nlink=1 [ 2948.654665][T29259] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 17:00:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBv/UjfJJTyaGkhUBAVj6RJH/TABQQSB5CQ4FDEKSRpVeo2qAkSrSoIHMIRVeKOOCLxF3ChXBBwQuJa7ggpQrm0cDJaezd1EzuJEycu9e8nbTLjHWvm292xZ2dsB9CzBtM/ScTuiLgREf317J0FBuv/bi1cHf9n4ep4EtXq238ntXI3F66O50Xz5+2qZ6qlLL+tSb1z70WMVSqTl7L88MyFD4enL1954dyFsbOTZycvjp46dfzYob6Toyc6Emca180Dn0wd3P/6u9feHD997f1fvkvbuzvb3xhHpwzWj25TT3e6si7b05BOSl1sCG0pRkR6usq1/t8fxdixuK8/Xvu8q40DNlW1Wqg2e3/OzFaBe1g6mgd6Uf5Gn97/5tsWDT3uCvMv12+A0rhvZVt9TykKWZnykvvbThqMiNOz/36dbrFJ8xAAAI2up+Of55uN/wrxUEO5+7I1lIGIuD8i9kbEAxGxLyIejKiVfTgiHmmz/qUrJMvHP9X+dQW2Run476VsbevO8V8++ouBYpbbU4u/nJw5V5k8mh2TI1HeluZHVqjjx1d//7LVvsbxX7ql9edjwawdf5WWTNBNjM2MbSTmRvOfRRwoNYs/iXwZJ4mI/RFxYJ11nHv224Ot9q0e/wo6sM5U/Sbimfr5n40l8eeSluuTIy+eHD0xvD0qk0eH86tiuV9/m3urVf0bir8D5q9XY2fT638x/oFke8T05Svna+u10+3XMffHFy3vadZ7/fcl79TSfdljH4/NzFwaiehL3lj++Ojt5+b5vHx6/R853Lz/743bR+LRiEgv4kMR8VhEPJ61/YmIeDIiDq8Q/8+vPPVB+/GvMCvfQWn8E6ud/2g8/+0niud/+r79+HPp+T9eSx3JHlnL699aG7iRYwcAAAD/F4XaZ+CTwtBiulAYGqp/hn9f7CxUpqZnnjsz9dHFifpn5QeiXMhnuvob5kNHsrnhPD+6JH8smzf+qrijlh8an6pMdDt46HG7WvT/1J/FbrcO2HS+rwW9S/+H3qX/Q+/S/6F36f/Qu5r1/0+70A5gy91YZZ1vx1Y1BNh6xv/Qu/R/6F36P/Sklt+NL2zoK/8SXUr80Lex32pYeyIKd0nI90yiHE13ldb8YxbrTGxruqvbr0wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACd8V8AAAD//8nE4wk=") [ 2948.663654][T29267] loop0: detected capacity change from 0 to 512 [ 2948.669066][T29260] EXT4-fs (loop4): corrupt root inode, run e2fsck [ 2948.676812][T29260] EXT4-fs (loop4): mount failed [ 2948.682351][T29259] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2948.684243][T29267] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2948.707170][T29269] loop3: detected capacity change from 0 to 512 17:00:08 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, 0x0, &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2948.713693][T29259] ext4_test_bit(bit=14, block=4) = 1 [ 2948.718999][T29259] is_bad_inode(inode)=0 [ 2948.723186][T29259] NEXT_ORPHAN(inode)=0 [ 2948.724555][T29269] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2948.727234][T29259] max_ino=32 [ 2948.727242][T29259] i_nlink=1 17:00:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2948.772512][T29274] loop2: detected capacity change from 0 to 512 [ 2948.791053][T29269] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2948.797345][T29267] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2948.814570][T29269] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2948.827753][T29269] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2948.829379][T29278] loop5: detected capacity change from 0 to 512 [ 2948.846338][T29267] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2948.847414][T29274] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2948.854987][T29279] loop4: detected capacity change from 0 to 512 17:00:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:08 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2948.877303][T29279] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2948.883727][T29278] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2948.894749][T29279] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2948.904067][T29279] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2948.918914][T29274] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 17:00:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2948.919907][T29279] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2948.951735][T29274] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2948.962794][T29278] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 17:00:08 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2948.971261][T29278] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2948.994781][T29286] loop3: detected capacity change from 0 to 512 [ 2949.008144][T29288] loop4: detected capacity change from 0 to 512 [ 2949.020000][T29288] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2949.030903][T29278] ext4_test_bit(bit=14, block=4) = 1 [ 2949.033323][T29274] ext4_test_bit(bit=14, block=4) = 1 [ 2949.036200][T29278] is_bad_inode(inode)=0 [ 2949.041490][T29274] is_bad_inode(inode)=0 [ 2949.041498][T29274] NEXT_ORPHAN(inode)=0 [ 2949.041504][T29274] max_ino=32 [ 2949.045651][T29278] NEXT_ORPHAN(inode)=0 [ 2949.045658][T29278] max_ino=32 [ 2949.049831][T29274] i_nlink=1 [ 2949.053820][T29278] i_nlink=1 [ 2949.059906][T29286] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem 17:00:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:08 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2949.068545][T29293] loop0: detected capacity change from 0 to 512 [ 2949.090095][T29288] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2949.090177][T29286] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2949.107076][T29288] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large 17:00:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:08 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2949.133098][T29293] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2949.133753][T29286] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2949.157929][T29288] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2949.170470][T29286] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) 17:00:08 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:08 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPDv+pG+m/z6K4+WFgIFUfFImvRBD1xAIHEACQkORZxCklalboOaINEqgsAhHFEl7ogjEn8BF8oFASckrnBHSBHKpYULRmvvNm5ip3HixKX+fKRNZrxjzXx3d+zZGdsB9KzB9E8SsTsifo2I/nr29gKD9X83F2fH/1qcHU+iWn3jz6RW7sbi7HheNH/ernqmWsry25rUO/92xFilMnk5yw/PXHxvePrK1WfPXxw7N3lu8tLo6dMnjh/uOzV6siNxpnHdOPjh1KEDr7x17bXxM9fe+fHrtL27s/2NcXTKYP3oNvVEpyvrsj0N6aTUxYbQlmJEpKerXOv//VGMHbf29cfLn3S1ccCmqlYL1Wbvz5m5KnAPS0fzQC/K3+jT+99826Khx11h4YX6DVAa981sq+8pRSErU152f9tJgxFxZu7vL9ItNmkeAgCg0fV0/PNMs/FfIe5vKLc3W0MZiIj/RcS+iPh/ROyPiPsiamUfiIgH26x/+QrJyvFPtX9dga1ROv57Plvbun38l4/+YqCY5fbU4i8nZ89XJo9lx+RolLel+ZFV6vjupV8+a7WvcfyXbmn9+Vgwa8cfpWUTdBNjM2MbibnRwscRB0vN4k8iX8ZJIuJARBxcZx3nn/rqUKt9d45/FR1YZ6p+GfFk/fzPxbL4c0nL9cmR506NnhzeHpXJY8P5VbHSTz/Pv96q/r0bib8DFq5XY2fT6z+PP/kn2R4xfeXqhdp67XT7dcz/9mnLe5r1Xv99yZu1dF/22AdjMzOXRyL6kldXPj669Nw8n5dPr/+jR5r3/32xdCQeioj0Ij4cEQ9HxCNZ2x+NiMci4sgq8f/w4uPvth//KrPyHZTGP7Hq+Y+BNLV0/ttPFC98/0378efS83+iljqaPbKW17+1NnAjxw4AAAD+Kwq1z8AnhaFb6UJhaKj+Gf79sbNQmZqeefrs1PuXJuqflR+IciGf6epvmA8dyeaG8/zosvzxbN748+KOWn5ofKoy0e3gocftatH/U78Xu906YNP5vhb0Lv0fepf+D71L/4fepf9D72rW/z/qQjuArXeH9/8dW9UOYOsZ/0Pv0v+hd+n/0JNafje+sKGv/Et0KfFt38Z+q2HtiSjcJSHfM4lyNN1VWvOPWawzsa3prm6/MgEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHTGvwEAAP//KIDjCw==") [ 2949.208888][T29302] loop2: detected capacity change from 0 to 512 [ 2949.233139][T29293] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2949.252876][T29303] loop5: detected capacity change from 0 to 512 17:00:09 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2949.256466][T29307] loop4: detected capacity change from 0 to 512 [ 2949.259371][T29302] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2949.279442][T29303] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2949.291950][T29307] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2949.293086][T29303] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 17:00:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:09 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2949.307129][T29293] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2949.329937][T29316] loop3: detected capacity change from 0 to 512 [ 2949.338804][T29303] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2949.349888][T29302] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2949.352140][T29316] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2949.358597][T29307] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2949.375206][T29303] ext4_test_bit(bit=14, block=4) = 1 [ 2949.380540][T29303] is_bad_inode(inode)=0 [ 2949.384696][T29303] NEXT_ORPHAN(inode)=0 [ 2949.388763][T29303] max_ino=32 [ 2949.389055][T29302] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2949.391970][T29303] i_nlink=1 17:00:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:09 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2949.404144][T29321] loop0: detected capacity change from 0 to 512 [ 2949.410429][T29307] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2949.412151][T29302] ext4_test_bit(bit=14, block=4) = 1 [ 2949.431286][T29302] is_bad_inode(inode)=0 [ 2949.435431][T29302] NEXT_ORPHAN(inode)=0 [ 2949.439584][T29302] max_ino=32 [ 2949.442778][T29302] i_nlink=1 [ 2949.444736][T29321] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2949.454960][T29316] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2949.463007][T29307] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2949.475577][T29316] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature 17:00:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:09 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2949.499590][T29316] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2949.505053][T29326] loop5: detected capacity change from 0 to 512 [ 2949.526999][T29326] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2949.536680][T29326] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2949.545389][T29326] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 17:00:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2949.571921][T29321] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2949.590978][T29321] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2949.593246][T29332] loop4: detected capacity change from 0 to 512 [ 2949.606949][T29326] ext4_test_bit(bit=14, block=4) = 1 [ 2949.612338][T29326] is_bad_inode(inode)=0 17:00:09 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2949.614930][T29332] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2949.616471][T29326] NEXT_ORPHAN(inode)=0 [ 2949.626854][T29333] loop2: detected capacity change from 0 to 512 [ 2949.628837][T29326] max_ino=32 [ 2949.638275][T29326] i_nlink=1 17:00:09 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2949.668628][T29338] loop3: detected capacity change from 0 to 512 [ 2949.679172][T29333] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2949.690535][T29333] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2949.698749][T29332] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 17:00:09 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2949.715351][T29338] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2949.723687][T29333] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2949.731692][T29344] loop5: detected capacity change from 0 to 512 [ 2949.735519][T29332] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2949.757629][T29345] loop0: detected capacity change from 0 to 512 [ 2949.769813][T29344] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2949.778322][T29333] ext4_test_bit(bit=14, block=4) = 1 [ 2949.778548][T29345] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2949.783633][T29333] is_bad_inode(inode)=0 [ 2949.783640][T29333] NEXT_ORPHAN(inode)=0 [ 2949.783647][T29333] max_ino=32 [ 2949.783653][T29333] i_nlink=1 [ 2949.783838][T29332] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) 17:00:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2949.805814][T29345] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2949.836326][T29338] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2949.838963][T29345] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2949.844859][T29344] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 17:00:09 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:09 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2949.861705][T29338] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2949.888212][T29352] loop2: detected capacity change from 0 to 512 [ 2949.896997][T29352] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2949.909534][T29344] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2949.920023][T29338] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2949.921490][T29352] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2949.949898][T29352] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2949.961608][T29352] ext4_test_bit(bit=14, block=4) = 1 17:00:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPDv+pG+f8mvLY+WFgIFUfFImvRBD1xAIHEACQkORZxCklalboOaINEqgsAhHFEl7ogjEn8BF8oFASckrnBHSBHKpYULRmvvNm5ip3HixKX+fKRNZrxjzXx3d+zZGdsB9KzB9E8SsTsifo2I/nr29gKD9X83F2fH/1qcHU+iWn3jz6RW7sbi7HheNH/ernqmWsry25rUO/92xFilMnk5yw/PXHxvePrK1WfPXxw7N3lu8tLo6dMnjh/uOzV6siNxpnHdOPjh1KEDr7x17bXxM9fe+fHrtL27s/2NcXTKYP3oNvVEpyvrsj0N6aTUxYbQlmJEpKerXOv//VGMHbf29cfLn3S1ccCmqlYL1Wbvz5m5KnAPS0fzQC/K3+jT+99826Khx11h4YX6DVAa981sq+8pRSErU152f9tJgxFxZu7vL9ItNmkeAgCg0fV0/PNMs/FfIe5vKPe/bA1lICL+HxF7I2JfROyPiPsiamUfiIgH26x/+QrJyvFPtX9dga1ROv57Plvbun38l4/+YqCY5fbU4i8nZ89XJo9lx+RolLel+ZFV6vjupV8+a7WvcfyXbmn9+Vgwa8cfpWUTdBNjM2MbibnRwscRB0vN4k8iX8ZJIuJARBxcZx3nn/rqUKt9d45/FR1YZ6p+GfFk/fzPxbL4c0nL9cmR506NnhzeHpXJY8P5VbHSTz/Pv96q/n0bib8DFq5XY2fT6z+PP/kn2R4xfeXqhdp67XT7dcz/9mnLe5r1Xv99yZu1dF/22AdjMzOXRyL6kldXPj669Nw8n5dPr/+jR5r3/72xdCQeioj0Ij4cEQ9HxCNZ2x+NiMci4sgq8f/w4uPvth//KrPyHZTGP7Hq+Y+BNLV0/ttPFC98/0378efS83+iljqaPbKW17+1NnAjxw4AAAD+Kwq1z8AnhaFb6UJhaKj+Gf79sbNQmZqeefrs1PuXJuqflR+IciGf6epvmA8dyeaG8/zosvzxbN748+KOWn5ofKoy0e3gocftatH/U78Xu906YNP5vhb0Lv0fepf+D71L/4fepf9D72rW/z/qQjuArXeH9/8dW9UOYOsZ/0Pv0v+hd+n/0JNafje+sKGv/Et0KfFt38Z+q2HtiSjcJSHfM4lyNN1VWvOPWawzsa3prm6/MgEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHTGvwEAAP//gh3jEA==") 17:00:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2949.963447][T29344] ext4_test_bit(bit=14, block=4) = 1 [ 2949.966894][T29352] is_bad_inode(inode)=0 [ 2949.966901][T29352] NEXT_ORPHAN(inode)=0 [ 2949.966906][T29352] max_ino=32 [ 2949.966912][T29352] i_nlink=1 [ 2949.986784][T29344] is_bad_inode(inode)=0 [ 2949.991010][T29344] NEXT_ORPHAN(inode)=0 [ 2949.995108][T29344] max_ino=32 [ 2949.996439][T29357] loop4: detected capacity change from 0 to 512 [ 2949.998289][T29344] i_nlink=1 17:00:09 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2950.022142][T29357] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2950.045144][T29361] loop0: detected capacity change from 0 to 512 [ 2950.058808][T29357] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2950.061687][T29363] loop5: detected capacity change from 0 to 512 [ 2950.078705][T29361] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2950.089496][T29363] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2950.091633][T29366] loop2: detected capacity change from 0 to 512 17:00:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPDv+pG+f8mvFEpLC4GCqHgkTfqgBy4gkDiAhASHIk4hSatSt0FNkGgVQeAQjqgSd8QRib+AC+WCgBMSV7gjpAjl0sIFo7V3Gzex0zhx4lJ/PtImM96xZr67O/bsjO0AetZg+ieJ2B0Rv0ZEfz17e4HB+r+bi7Pjfy3OjidRrb7xZ1Ird2Nxdjwvmj9vVz1TLWX5bU3qnX87YqxSmbyc5YdnLr43PH3l6rPnL46dmzw3eWn09OkTxw/3nRo92ZE407huHPxw6tCBV9669tr4mWvv/Ph12t7d2f7GODplsH50m3qi05V12Z6GdFLqYkNoSzEi0tNVrvX//ijGjlv7+uPlT7raOGBTVauFarP358xcFbiHpaN5oBflb/Tp/W++bdHQ466w8EL9BiiN+2a21feUopCVKS+7v+2kwYg4M/f3F+kWmzQPAQDQ6Ho6/nmm2fivEA80lPtftoYyEBH/j4i9EXFfROyLiPsjamX3R8SDbda/fIVk5fin2r+uwNYoHf89n61t3T7+y0d/MVDMcntq8ZeTs+crk8eyY3I0ytvS/MgqdXz30i+ftdrXOP5Lt7T+fCyYteOP0rIJuomxmbGNxNxo4eOIg6Vm8SeRL+MkEXEgIg6us47zT311qNW+O8e/ig6sM1W/jHiyfv7nYln8uaTl+uTIc6dGTw5vj8rkseH8qljpp5/nX29V//6NxN8BC9ersbPp9Z/Hn/yTbI+YvnL1Qm29drr9OuZ/+7TlPc16r/++5M1aui977IOxmZnLIxF9yasrHx9dem6ez8un1//RI837/95YOhIPRUR6ER+OiIcj4pGs7Y9GxGMRcWSV+H948fF3249/lVn5Dkrjn1j1/MdAmlo6/+0nihe+/6b9+HPp+T9RSx3NHlnL699aG7iRYwcAAAD/FYXaZ+CTwtCtdKEwNFT/DP++2FmoTE3PPH126v1LE/XPyg9EuZDPdPU3zIeOZHPDeX50Wf54Nm/8eXFHLT80PlWZ6Hbw0ON2tej/qd+L3W4dsOl8Xwt6l/4PvUv/h96l/0Pv0v+hdzXr/x91oR3A1rvD+/+OrWoHsPWM/6F36f/Qu/R/6Ektvxtf2NBX/iW6lPi2b2O/1bD2RBTukpDvmUQ5mu4qrfnHLNaZ2NZ0V7dfmQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADrj3wAAAP///P7jFA==") 17:00:09 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2950.109507][T29357] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2950.112880][T29366] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2950.129009][T29357] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2950.141450][T29366] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2950.144722][T29361] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) 17:00:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2950.174527][T29366] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2950.185554][T29363] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2950.190904][T29375] loop3: detected capacity change from 0 to 512 [ 2950.195612][T29366] ext4_test_bit(bit=14, block=4) = 1 [ 2950.205221][T29366] is_bad_inode(inode)=0 [ 2950.209402][T29366] NEXT_ORPHAN(inode)=0 [ 2950.213463][T29366] max_ino=32 [ 2950.216655][T29366] i_nlink=1 17:00:10 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:10 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2950.220461][T29375] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2950.221538][T29363] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2950.246290][T29361] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2950.251498][T29363] ext4_test_bit(bit=14, block=4) = 1 [ 2950.259761][T29363] is_bad_inode(inode)=0 [ 2950.263915][T29363] NEXT_ORPHAN(inode)=0 [ 2950.268020][T29363] max_ino=32 [ 2950.271306][T29363] i_nlink=1 17:00:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:10 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2950.292441][T29375] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2950.320198][T29375] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature 17:00:10 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2950.354707][T29375] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2950.356934][T29388] loop4: detected capacity change from 0 to 512 [ 2950.374505][T29388] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2950.388906][T29391] loop0: detected capacity change from 0 to 512 17:00:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2950.427641][T29391] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2950.427640][T29394] loop2: detected capacity change from 0 to 512 [ 2950.447158][T29388] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2950.454503][T29396] loop5: detected capacity change from 0 to 512 [ 2950.469676][T29396] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 17:00:10 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2950.478654][T29391] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2950.478896][T29400] loop3: detected capacity change from 0 to 512 [ 2950.504028][T29400] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2950.505181][T29388] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2950.527108][T29394] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2950.528499][T29388] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2950.537912][T29391] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2950.551736][T29396] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2950.565455][T29396] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 17:00:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:10 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2950.567656][T29394] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2950.576057][T29396] ext4_test_bit(bit=14, block=4) = 1 [ 2950.584215][T29400] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2950.589103][T29396] is_bad_inode(inode)=0 [ 2950.589111][T29396] NEXT_ORPHAN(inode)=0 [ 2950.605431][T29396] max_ino=32 [ 2950.608619][T29396] i_nlink=1 [ 2950.615466][T29400] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature 17:00:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPCvX0nTxy/5lfJoaCFQEBGPpEkf9MAFBBIHkJDgUMQpJGkV6jaoCRKtIggcwhFV4o44IvEXcKFcEHBC4gp3hBShXFo4Ga2927iJncaJE5f685E2mfGONfPd3bFnZ2wH0LWGkj+5iP0R8VtE9NeytxcYqv27ubIw+ffKwmQuKpU3/8pVy91YWZjMimbP21fLVIppvrdBvUvvREyUy9OX0/zo/MX3R+euXH1u5uLE+enz05fGz5w5eeJoz+nxU22JM4nrxuBHs0cOv/r2tdcnz15796dvkvbuT/fXx9EuQ7Wj29CT7a6sww7UpXPFDjaElhQiIjldpWr/749C9N3a1x+vfNrRxgE7qlLJVxq9P6cWK8A9LBnNA90oe6NP7n+zbZeGHneF5RdrN0BJ3DfTrbanGPm0TGnN/W07DUXE2cV/vky22KF5CACAeteT8c+zjcZ/+Xigrtz/0jWUgYj4f0QcjIj7IuJQRNwfUS37YEQ81GL9a1dI1o9/Kv1bCmyTkvHfC+na1u3jv2z0F32FNHegGn8pd26mPH08PSbDUepN8mMb1PH9y79+3mxf/fgv2ZL6s7Fg2o4/i2sm6KYm5ie2E3O95U8iBouN4s9FtoyTi4jDETG4xTpmnv76SLN9d45/A21YZ6p8FfFU7fwvxpr4M7mm65Njz58ePzW6J8rTx0ezq2K9n39ZeqNZ/duKvw2Wr1dib8Prvy7+PRFzV65eqK7XzrVex9LvnzW9p9nq9d+Te6ua7kkf+3Bifv7yWERP7rX1j4+vPjfLZ+WT63/4WOP+fzBWj8TDEZFcxEcj4pGIeDRt+2MR8XhEHNsg/h9feuK91uPfYFa+jZL4pzY+/wNJavX8t54oXPjh29bjzyTn/2Q1NZw+spnXv802cDvHDgAAAP4r8tXPwOfyI7fS+fzISO0z/Idib748Ozf/zLnZDy5N1T4rPxClfDbT1V83HzqWzg1n+fE1+RPpvPEXhb5qfmRytjzV6eChy+1r0v8TfxQ63Tpgx/m+FnQv/R+6l/4P3Uv/h+6l/0P3atT/P+5AO4Ddd4f3/77dagew+4z/oXvp/9C99H/oSk2/G5/f1lf+JTqU+K5ne7/VsPlE5O+SkO+ZRCka7ipu+scstpjobbir069MAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA7fFvAAAA//9xAeIX") [ 2950.647857][T29409] loop4: detected capacity change from 0 to 512 [ 2950.655480][T29394] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2950.667024][T29394] ext4_test_bit(bit=14, block=4) = 1 [ 2950.672367][T29394] is_bad_inode(inode)=0 [ 2950.672689][T29400] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2950.676506][T29394] NEXT_ORPHAN(inode)=0 [ 2950.676514][T29394] max_ino=32 17:00:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:10 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2950.676519][T29394] i_nlink=1 [ 2950.686194][T29409] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2950.740864][T29414] loop0: detected capacity change from 0 to 512 [ 2950.741306][T29411] loop5: detected capacity change from 0 to 512 [ 2950.748337][T29414] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2950.764726][T29411] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2950.776752][T29409] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2950.788424][T29419] loop3: detected capacity change from 0 to 512 [ 2950.796531][T29419] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2950.796716][T29409] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2950.806395][T29414] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) 17:00:10 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2950.819338][T29409] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2950.855664][T29414] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2950.864890][T29411] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2950.876421][T29419] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 17:00:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:10 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2950.887641][T29423] loop2: detected capacity change from 0 to 512 [ 2950.888180][T29411] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2950.905622][T29423] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2950.908347][T29419] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2950.915756][T29411] ext4_test_bit(bit=14, block=4) = 1 [ 2950.932124][T29411] is_bad_inode(inode)=0 [ 2950.936275][T29411] NEXT_ORPHAN(inode)=0 [ 2950.940417][T29411] max_ino=32 [ 2950.943699][T29411] i_nlink=1 [ 2950.947260][T29419] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2950.968157][T29423] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 17:00:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPCvX2mTtr/kV8qjoYVAQUQ8kiZ90AMXEEgcQEKCQxGnkKRVqNugJki0iiBwCEdUiTviiMRfwIVyQcAJiSvcEVKEcmnhZLT2buMmdhonTlzqz0faZMY71sx3d8eenbEdQNcaSv7kIvZHxG8R0V/L3l5gqPbv5srC5N8rC5O5qFTe/CtXLXdjZWEyK5o9b18tUymm+T0N6l16J2KiXJ6+nOZH5y++Pzp35epzMxcnzk+fn740fubMyRNHe06Pn2pLnElcNwY/mj1y+NW3r70+efbauz99k7R3f7q/Po52Gaod3YaebHdlHXagLp0rdrAhtKQQEcnpKlX7f38UovfWvv545dOONg7YUZVKvtLo/Tm1WAHuYcloHuhG2Rt9cv+bbbs09LgrLL9YuwFK4r6ZbrU9xcinZUpr7m/baSgizi7+82WyxQ7NQwAA1LuejH+ebTT+y8cDdeX+l66hDETE/yPiYETcFxGHIuL+iGrZByPioRbrX7tCsn78U+nfUmCblIz/XkjXtm4f/2Wjv+grpLkD1fhLuXMz5enj6TEZjtKeJD+2QR3fv/zr58321Y//ki2pPxsLpu34s7hmgm5qYn5iOzHXW/4kYrDYKP5cZMs4uYg4HBGDW6xj5umvjzTbd+f4N9CGdabKVxFP1c7/YqyJP5Nruj459vzp8VOje6M8fXw0uyrW+/mXpTea1b+t+Ntg+Xol+hpe/3Xx742Yu3L1QnW9dq71OpZ+/6zpPc1Wr/+e3FvVdE/62IcT8/OXxyJ6cq+tf3x89blZPiufXP/Dxxr3/4OxeiQejojkIj4aEY9ExKNp2x+LiMcj4tgG8f/40hPvtR7/BrPybZTEP7Xx+R9IUqvnv/VE4cIP37YefyY5/yerqeH0kc28/m22gds5dgAAAPBfka9+Bj6XH7mVzudHRmqf4T8Uffny7Nz8M+dmP7g0Vfus/ECU8tlMV3/dfOhYOjec5cfX5E+k88ZfFHqr+ZHJ2fJUp4OHLrevSf9P/FHodOuAHef7WtC99H/oXvo/dC/9H7qX/g/dq1H//7gD7QB23x3e/3t3qx3A7jP+h+6l/0P30v+hKzX9bnx+W1/5l+hQ4rue7f1Ww+YTkb9LQr5nEqVouKu46R+z2GJiT8NdnX5lAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaI9/AwAA//9SGuIY") 17:00:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:10 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2950.993243][T29430] loop4: detected capacity change from 0 to 512 [ 2951.011793][T29423] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2951.029246][T29430] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem 17:00:10 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPDv+pG+f8mvlEdLC4FSUfFImvRBD1xAIHEACQkORZxCklalboOaINEqgsAhHFEl7ogjEn8BF8oFASckrnBHSBHKpYULRmvvNm5ip3HixKX+fKRNZrxjzXx3d+zZGdsB9KzB9E8SsTsifo2I/nr29gKD9X83F2fH/1qcHU+iWn3jz6RW7sbi7HheNH/ernqmWsry25rUO/92xFilMnk5yw/PXHxvePrK1WfPXxw7N3lu8tLo6dMnjh/qOzV6siNxpnHdOPDh1MH9r7x17bXxM9fe+fHrtL27s/2NcXTKYP3oNnWk05V12Z6GdFLqYkNoSzEi0tNVrvX//ijGjlv7+uPlT7raOGBTVauFarP358xcFbiHpaN5oBflb/Tp/W++bdHQ466w8EL9BiiN+2a21feUopCVKS+7v+2kwYg4M/f3F+kWmzQPAQDQ6Ho6/nmm2fivEA80lPtftoYyEBH/j4i9EXFfROyLiPsjamUfjIiH2qx/+QrJyvFPtX9dga1ROv57Plvbun38l4/+YqCY5fbU4i8nZ89XJo9lx+RolLel+ZFV6vjupV8+a7WvcfyXbmn9+Vgwa8cfpWUTdBNjM2MbibnRwscRB0rN4k8iX8ZJImJ/RBxYZx3nn/rqYKt9d45/FR1YZ6p+GfFk/fzPxbL4c0nL9cmR506NnhzeHpXJY8P5VbHSTz/Pv96q/iMbib8DFq5XY2fT6z+PP/kn2R4xfeXqhdp67XT7dcz/9mnLe5r1Xv99yZu1dF/22AdjMzOXRyL6kldXPj669Nw8n5dPr/+jh5v3/72xdCQejoj0Ij4UEY9ExKNZ2x+LiMcj4vAq8f/w4hPvth//KrPyHZTGP7Hq+Y+BNLV0/ttPFC98/0378efS83+iljqaPbKW17+1NnAjxw4AAAD+Kwq1z8AnhaFb6UJhaKj+Gf59sbNQmZqeefrs1PuXJuqflR+IciGf6epvmA8dyeaG8/zosvzxbN748+KOWn5ofKoy0e3gocftatH/U78Xu906YNP5vhb0Lv0fepf+D71L/4fepf9D72rW/z/qQjuArXeH9/8dW9UOYOsZ/0Pv0v+hd+n/0JNafje+sKGv/Et0KfFt38Z+q2HtiSjcJSHfM4lyNN1VWvOPWawzsa3prm6/MgEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHTGvwEAAP//KzfjIg==") [ 2951.044523][T29423] ext4_test_bit(bit=14, block=4) = 1 [ 2951.049880][T29423] is_bad_inode(inode)=0 [ 2951.052050][T29434] loop0: detected capacity change from 0 to 512 [ 2951.054014][T29423] NEXT_ORPHAN(inode)=0 [ 2951.054021][T29423] max_ino=32 [ 2951.054027][T29423] i_nlink=1 [ 2951.082121][T29430] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 17:00:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2951.090418][T29434] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2951.105028][T29430] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2951.105665][T29443] loop5: detected capacity change from 0 to 512 [ 2951.128486][T29443] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2951.137748][T29434] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2951.152281][T29430] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2951.152640][T29434] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2951.173600][T29443] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2951.189123][T29449] loop2: detected capacity change from 0 to 512 17:00:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:11 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2951.189522][T29443] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2951.209647][T29449] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2951.221480][T29443] ext4_test_bit(bit=14, block=4) = 1 [ 2951.226791][T29443] is_bad_inode(inode)=0 [ 2951.231079][T29443] NEXT_ORPHAN(inode)=0 [ 2951.235173][T29443] max_ino=32 [ 2951.238365][T29443] i_nlink=1 17:00:11 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2951.264660][T29449] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2951.293668][T29457] loop4: detected capacity change from 0 to 512 [ 2951.304601][T29449] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 17:00:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPDv+pG+f8mvlEdLC4GCqHgkTfqgBy68JA4gIcGhiFNI0qrUbVATJFpFEDiEI6rEHXFE4i/gQrkg4ITEFe4IKUK5tHDBaO3dxk3sNE6cuNSfj7TJjHesme/ujj07YzuAnjWY/kkidkfErxHRX8/eWmCw/u/G4uz4X4uz40lUq2/8mdTKXV+cHc+L5s/bVc9US1l+W5N659+OGKtUJi9l+eGZC+8NT1++8sy5C2NnJ89OXhw9der4sUN9J0dPdCTONK7rBz6cOrj/lbeuvjZ++uo7P36dtnd3tr8xjk4ZrB/dph7vdGVdtqchnZS62BDaUoyI9HSVa/2/P4qx4+a+/nj5k642DthU1Wqh2uz9OTNXBe5i6Wge6EX5G316/5tvWzT0uCMsPF+/AUrjvpFt9T2lKGRlysvubztpMCJOz/39RbrFJs1DAAA0upaOf55uNv4rxH0N5f6XraEMRMT/I2JvRNwTEfsi4t6IWtn7I+KBNutfvkKycvxT7V9XYGuUjv+ey9a2bh3/5aO/GChmuT21+MvJmXOVyaPZMTkS5W1pfmSVOr576ZfPWu1rHP+lW1p/PhbM2vFHadkE3cTYzNhGYm608HHEgVKz+JPIl3GSiNgfEQfWWce5J7862Grf7eNfRQfWmapfRjxRP/9zsSz+XNJyfXLk2ZOjJ4a3R2Xy6HB+Vaz008/zr7eq/8WNxN8BC9eqsbPp9Z/Hn/yTbI+YvnzlfG29drr9OuZ/+7TlPc16r/++5M1aui977IOxmZlLIxF9yasrHx9dem6ez8un1/+Rw837/95YOhIPRkR6ER+KiIci4uGs7Y9ExKMRcXiV+H944bF3249/lVn5Dkrjn1j1/MdAmlo6/+0niue//6b9+HPp+T9eSx3JHlnL699aG7iRYwcAAAD/FYXaZ+CTwtDNdKEwNFT/DP++2FmoTE3PPHVm6v2LE/XPyg9EuZDPdPU3zIeOZHPDeX50Wf5YNm/8eXFHLT80PlWZ6Hbw0ON2tej/qd+L3W4dsOl8Xwt6l/4PvUv/h96l/0Pv0v+hdzXr/x91oR3A1rvN+/+OrWoHsPWM/6F36f/Qu/R/6Ektvxtf2NBX/iW6lPi2b2O/1bD2RBTukJDvmkQ5mu4qrfnHLNaZ2NZ0V7dfmQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADrj3wAAAP//RQPjQA==") [ 2951.304673][T29457] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2951.316191][T29449] ext4_test_bit(bit=14, block=4) = 1 [ 2951.328466][T29449] is_bad_inode(inode)=0 [ 2951.332697][T29449] NEXT_ORPHAN(inode)=0 [ 2951.336752][T29449] max_ino=32 [ 2951.340055][T29449] i_nlink=1 [ 2951.353941][T29460] loop0: detected capacity change from 0 to 512 17:00:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:11 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2951.366337][T29460] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2951.384689][T29457] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2951.395883][T29467] loop5: detected capacity change from 0 to 512 17:00:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2951.404814][T29457] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2951.406626][T29460] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2951.419508][T29467] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2951.453761][T29457] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2951.479819][T29474] loop2: detected capacity change from 0 to 512 [ 2951.487585][T29460] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2951.488683][T29474] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2951.508257][T29477] loop3: detected capacity change from 0 to 512 17:00:11 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtrXNUfAPDvnUf6/iW/Wh+trUarWHwkTfqwCzcVBRcKgi4qrmKSltppI00EW4JGF3EpBfciuBH8C9xYN6KuBLe6FyFINq2uRu7Mvek0nUkyySRTO58P3OScOSec8733nsyZc2YmgJ41mP5IInZHxG8R0V/P3l5hsP7r5uLs+N+Ls+NJVKtv/JXU6t1YnB3Pq+Z/t6ueqZay/LYm7c6/HTFWqUxezvLDMxffG56+cvW58xfHzk2em7w0eurU8WOH+k6OnuhInGlcNw58OHVw/ytvXXtt/My1d376Ju3v7qy8MY5OGayf3aae7HRjXbanIZ2UutgR2lKMiPRylWvjvz+KsWOprD9e/qSrnQM2VbVaqDZ7fs7MVYF7WDqbB3pR/kSfvv7Njy2aetwVFk5HfJXFfzM76iWlKGR1yste33bSYEScmfvni/SITVqHAABodP10RDzbbP5XiAca6v0v20MZiIj/R8TeiLgvIvZFxP0RtboPRsRDbba/fIfkzvlPtX9dga1ROv97Idvbun3+l8/+YqCY5fbU4i8nZ89XJo9m5+RIlLel+ZEV2vj+pV8/a1XWOP9Lj7T9fC6Y9ePP0rIFuomxmbGNxNxo4eOIA6Vm8SeRb+MkEbE/Ig6ss43zT399sFXZ6vGvoAP7TNUvI56qX/+5WBZ/Lmm5Pzny/MnRE8PbozJ5dDi/K+708y/zr7dqf0Pxd8DC9WrsbHr/L8U/kGyPmL5y9UJtv3a6/Tbmf/+05Wua9d7/fcmbeXYu/fHB2MzM5ZGIvuTV2oN9WWHt8dFbf5vn8/rp/X/kcPPxvzdunYmHIyK9iQ9FxCMR8WjW98ci4vGIOLxC/D+++MS77ce/wqp8B6XxT6x2/aPx+refKF744dv248+l1/94LXUke2Qt///W2sGNnDsAAAD4ryjU3gOfFIaW0oXC0FD9Pfz7YmehMjU988zZqfcvTdTfKz8Q5UK+0tXfsB46kq0N5/nRZflj2brx58UdtfzQ+FRlotvBQ4/b1WL8p/4odrt3wKbzeS3oXcY/9C7jH3qX8Q+9y/iH3tVs/H/UhX4AW2+V5/8dW9UPYOuZ/0PvMv6hdxn/0JNafja+sKGP/Et0KfFd38a+q2HtiSjcJSHfM4lyNC0qrfnLLNaZ2Na0qNv/mQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADrj3wAAAP//BvzjSA==") 17:00:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2951.525122][T29477] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2951.534639][T29467] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2951.550219][T29477] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2951.550185][T29467] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2951.550343][T29477] ================================================================== 17:00:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2951.550370][T29477] BUG: KCSAN: data-race in data_push_tail / string [ 2951.550396][T29477] [ 2951.550403][T29477] write to 0xffffffff86ed3a83 of 1 bytes by task 29467 on cpu 1: [ 2951.550421][T29477] string+0x16c/0x200 [ 2951.550445][T29477] vsnprintf+0xa09/0xe20 [ 2951.550475][T29477] vscnprintf+0x42/0x80 [ 2951.550495][T29477] printk_sprint+0x30/0x2d0 [ 2951.550523][T29477] vprintk_store+0x56f/0x800 [ 2951.550551][T29477] vprintk_emit+0xd0/0x5d0 [ 2951.550578][T29477] vprintk_default+0x26/0x30 [ 2951.550602][T29477] vprintk+0x71/0x80 17:00:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:11 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x0, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2951.550616][T29477] _printk+0x7a/0xa0 [ 2951.550635][T29477] __ext4_error+0x21c/0x310 [ 2951.550654][T29477] ext4_orphan_get+0x24b/0x3e0 [ 2951.550684][T29477] ext4_orphan_cleanup+0x5bc/0x9b0 [ 2951.550707][T29477] ext4_fill_super+0x3660/0x39a0 [ 2951.550734][T29477] get_tree_bdev+0x272/0x300 [ 2951.550753][T29477] ext4_get_tree+0x1c/0x20 [ 2951.550776][T29477] vfs_get_tree+0x51/0x1b0 [ 2951.550792][T29477] do_new_mount+0x203/0x660 [ 2951.550808][T29477] path_mount+0x496/0xb30 [ 2951.550822][T29477] __se_sys_mount+0x27f/0x2d0 17:00:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2951.550838][T29477] __x64_sys_mount+0x67/0x80 [ 2951.550857][T29477] do_syscall_64+0x44/0x110 [ 2951.550881][T29477] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2951.550902][T29477] [ 2951.550907][T29477] read to 0xffffffff86ed3a80 of 8 bytes by task 29477 on cpu 0: [ 2951.550922][T29477] data_push_tail+0x102/0x430 [ 2951.550939][T29477] data_alloc+0xbe/0x2c0 [ 2951.550955][T29477] prb_reserve+0x893/0xbc0 [ 2951.550973][T29477] vprintk_store+0x53e/0x800 [ 2951.551000][T29477] vprintk_emit+0xd0/0x5d0 [ 2951.551027][T29477] vprintk_default+0x26/0x30 17:00:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2951.551051][T29477] vprintk+0x71/0x80 [ 2951.551065][T29477] _printk+0x7a/0xa0 [ 2951.551083][T29477] __ext4_msg+0x18a/0x1a0 [ 2951.551100][T29477] ext4_orphan_cleanup+0x418/0x9b0 [ 2951.551122][T29477] ext4_fill_super+0x3660/0x39a0 [ 2951.551149][T29477] get_tree_bdev+0x272/0x300 [ 2951.551169][T29477] ext4_get_tree+0x1c/0x20 [ 2951.551191][T29477] vfs_get_tree+0x51/0x1b0 [ 2951.551207][T29477] do_new_mount+0x203/0x660 [ 2951.551223][T29477] path_mount+0x496/0xb30 [ 2951.551237][T29477] __se_sys_mount+0x27f/0x2d0 [ 2951.551254][T29477] __x64_sys_mount+0x67/0x80 [ 2951.551275][T29477] do_syscall_64+0x44/0x110 [ 2951.551302][T29477] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 2951.551326][T29477] [ 2951.551331][T29477] value changed: 0x000000010001d23e -> 0x6578652d7a797320 [ 2951.551345][T29477] [ 2951.551349][T29477] Reported by Kernel Concurrency Sanitizer on: [ 2951.551358][T29477] CPU: 0 PID: 29477 Comm: syz-executor.3 Not tainted 6.7.0-rc3-syzkaller-00284-g815fb87b7530 #0 17:00:11 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x0, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2951.551384][T29477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 [ 2951.551396][T29477] ================================================================== [ 2951.555623][T29483] loop0: detected capacity change from 0 to 512 [ 2951.569833][T29474] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2951.581792][T29467] ext4_test_bit(bit=14, block=4) = 1 [ 2951.598168][T29474] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2951.598307][T29467] is_bad_inode(inode)=0 [ 2951.598315][T29467] NEXT_ORPHAN(inode)=0 17:00:11 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2951.616159][T29474] ext4_test_bit(bit=14, block=4) = 1 [ 2951.620154][T29467] max_ino=32 [ 2951.620161][T29467] i_nlink=1 [ 2951.624602][T29483] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2951.624829][T29474] is_bad_inode(inode)=0 [ 2951.628757][T29477] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2951.632532][T29474] NEXT_ORPHAN(inode)=0 [ 2951.632540][T29474] max_ino=32 [ 2951.632545][T29474] i_nlink=1 [ 2951.650913][T29487] loop4: detected capacity change from 0 to 512 [ 2951.694437][T29477] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2951.697564][T29487] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2951.718346][T29483] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2951.750661][T29492] loop5: detected capacity change from 0 to 512 17:00:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPDv+pG2v7a/hFIeLS0ECqLikTTpgx64gEDiABISHIo4hSStQt0GNUGiVQSBQziiStwRRyT+Ai6UCwJOSFzhjpAilEsLF4zW3m3cxE7jxIlL/flIm8x4x5r57u7YszO2A+hZg+mfJGJPRPwaEf317K0FBuv/bizNjf+1NDeeRLX6xp9Jrdz1pbnxvGj+vN31TLWU5Xc0qXfh7YixSmXyUpYfnr3w3vDM5SvPTl0YOzd5bvLi6OnTJ44f7js1erIjcaZxXT/44fShA6+8dfW18TNX3/nx67S9e7L9jXF0ymD96Db1RKcr67K9Demk1MWG0JZiRKSnq1zr//1RjF039/XHy590tXHAlqpWC9Vm78+Z+SpwF0tH80Avyt/o0/vffNumoccdYfGF+g1QGveNbKvvKUUhK1NecX/bSYMRcWb+7y/SLbZoHgIAoNG1dPzzTLPxXyHubyj3/2wNZSAi7omIfRFxb0Tsj4j7ImplH4iIB9usf+UKyerxT7V/Q4GtUzr+ez5b27p1/JeP/mKgmOX21uIvJ2enKpPHsmNyNMo70vzIGnV899Ivn7Xa1zj+S7e0/nwsmLXjj9KKCbqJsdmxzcTcaPHjiIOlZvEnkS/jJBFxICIObrCOqae+OtRq3+3jX0MH1pmqX0Y8WT//87Ei/lzScn1y5LlToyeHd0Zl8thwflWs9tPPC6+3qn9T8XfA4rX6LWCz85/9/yfZGTFz+cr52nrtTPt1LPz2act7mo1e/33Jm7V0X/bYB2Ozs5dGIvqSV1c/Prr83Dyfl0+v/6NHmvf/fbF8JB6KiPQiPhwRD0fEI1nbH42IxyLiyBrx//Di4++2H/8as/IdlMY/seb5j4E0tXz+208Uz3//Tfvx59Lzf6KWOpo9sp7Xv/U2cDPHDgAAAP4rCrXPwCeFoZvpQmFoqP4Z/v3xv0Jlemb26bPT71+cqH9WfiDKhXymq79hPnQkmxvO86Mr8sezeePPi7tq+aHx6cpEt4OHHre7Rf9P/V7sduuALef7WtC79H/oXfo/9C79H3qX/g+9q1n//6gL7QC2323e/3dtVzuA7Wf8D71L/4fepf9DT2r53fjCpr7yL9GlxLd9m/uthvUnonCHhHzXJMrRdFdp3T9mscHEjqa7uv3KBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0Bn/BgAA//8jeeMT") [ 2951.771826][T29483] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2951.811297][T29487] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2951.848083][T29495] loop2: detected capacity change from 0 to 512 [ 2951.849931][T29487] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2951.889735][T29492] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2951.892491][T29487] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2951.900170][T29495] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2951.915914][T29492] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2951.934166][T29495] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2951.946995][T29492] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2952.027383][T29495] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2952.035971][T29503] loop3: detected capacity change from 0 to 512 17:00:11 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x0, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2952.052538][T29492] ext4_test_bit(bit=14, block=4) = 1 [ 2952.062960][T29506] loop0: detected capacity change from 0 to 512 [ 2952.066335][T29492] is_bad_inode(inode)=0 [ 2952.078045][T29503] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2952.082860][T29492] NEXT_ORPHAN(inode)=0 [ 2952.082868][T29492] max_ino=32 [ 2952.082875][T29492] i_nlink=1 [ 2952.088584][T29506] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2952.125845][T29495] ext4_test_bit(bit=14, block=4) = 1 17:00:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2952.131163][T29495] is_bad_inode(inode)=0 [ 2952.135402][T29495] NEXT_ORPHAN(inode)=0 [ 2952.139501][T29495] max_ino=32 [ 2952.142695][T29495] i_nlink=1 [ 2952.145142][T29506] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2952.151619][T29507] loop4: detected capacity change from 0 to 512 [ 2952.162460][T29506] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2952.170333][T29503] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 17:00:11 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2952.189609][T29503] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2952.202774][T29507] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem [ 2952.202987][T29513] loop5: detected capacity change from 0 to 512 [ 2952.221242][T29503] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) 17:00:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBv/UjfJJTyaGkhtCAqHkmTPuiBCwgkDiAhwaGIU0jSqtRtUBMkWkUQOIQjqsQdcUTiL+BCuSDghMQV7ggpQrm0cDJaezd1EzuNEycu9e8nbTLjWWvm292xZ2dsB9CzBtM/ScTuiPg9Ivrr2dt3GKz/u7k4O/7P4ux4EtXqW38ntf1uLM6O57vmz9tVz1RLWX5bk3rn340Yq1QmL2f54ZmLHwxPX7n6/PmLY+cmz01eGj19+sTxQ32nRk92JM40rhsHPp46uP+1d669MX7m2ns/f5u2d3dW3hhHpwzWj25TT3W6si7b05BOSl1sCG0pRkR6usq1/t8fxdixVNYfr37W1cYBm6paLVSbvT9n5qrAPSwdzQO9KH+jT+9/822Lhh53hYWX6jdAadw3s61eUopCtk952f1tJw1GxJm5f79Kt9ikeQgAgEbX0/HPc83Gf4V4qGG/+7I1lIGIuD8i9kbEAxGxLyIejKjt+3BEPNJm/ctXSFaOf6r96wpsjdLx34vZ2tbt47989BcDxSy3pxZ/OTl7vjJ5LDsmR6O8Lc2PrFLHD6/89kWrssbxX7ql9edjwawdf5WWTdBNjM2MbSTmRgufRhwoNYs/iXwZJ4mI/RFxYJ11nH/mm4Otyu4c/yo6sM5U/Tri6fr5n4tl8eeSluuTIy+cGj05vD0qk8eG86tipV9+nX+zVf0bir8DFq5XY2fT638p/oFke8T0lasXauu10+3XMf/H5y3vadZ7/fclb9fSfdljH43NzFweiehLXl/5+Oit5+b5fP/0+j96pHn/3xu3jsSjEZFexIci4rGIeDxr+xMRcTgijqwS/08vP/l++/GvMivfQWn8E3c6/9F4/ttPFC/8+F378efS83+iljqaPbKW17+1NnAjxw4AAAD+Lwq1z8AnhaGldKEwNFT/DP++2FmoTE3PPHt26sNLE/XPyg9EuZDPdPU3zIeOZHPDeX50Wf54Nm/8ZXFHLT80PlWZ6Hbw0ON2tej/qT+L3W4dsOl8Xwt6l/4PvUv/h96l/0Pv0v+hdzXr/590oR3A1ksOr1q8Y8saAmw543/oXfo/9C79H3pSy+/GFzb0lX+JLiW+79vYbzWsPRGFuyTkeyZRjqZFpTX/mMU6E9uaFnX7lQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKAz/gsAAP//VATiTQ==") 17:00:12 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2952.236327][T29507] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2952.252359][T29507] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large 17:00:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:12 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2952.283447][T29513] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2952.298985][T29513] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2952.312487][T29520] loop0: detected capacity change from 0 to 512 [ 2952.320446][T29507] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) 17:00:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2952.334603][T29520] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2952.342979][T29513] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2952.358916][T29526] loop3: detected capacity change from 0 to 512 [ 2952.366381][T29513] ext4_test_bit(bit=14, block=4) = 1 [ 2952.371784][T29513] is_bad_inode(inode)=0 [ 2952.372732][T29526] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2952.375919][T29513] NEXT_ORPHAN(inode)=0 17:00:12 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2952.375927][T29513] max_ino=32 [ 2952.387625][T29520] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2952.388202][T29513] i_nlink=1 [ 2952.393905][T29527] loop2: detected capacity change from 0 to 512 [ 2952.407285][T29520] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2952.418272][T29527] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2952.424930][T29526] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 17:00:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2952.453098][T29527] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2952.461425][T29526] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2952.474906][T29527] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2952.493491][T29527] ext4_test_bit(bit=14, block=4) = 1 [ 2952.498800][T29527] is_bad_inode(inode)=0 17:00:12 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2952.502970][T29527] NEXT_ORPHAN(inode)=0 [ 2952.507026][T29527] max_ino=32 [ 2952.510239][T29527] i_nlink=1 [ 2952.532219][T29537] loop5: detected capacity change from 0 to 512 17:00:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2952.543132][T29526] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2952.565688][T29541] loop0: detected capacity change from 0 to 512 [ 2952.573815][T29537] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2952.590501][T29541] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem 17:00:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG8UfAPDv+pG+f8mvlEdLC4GCqHgkTfqgBw4UgcQBJCQ4FHEKSVqVug1qgkSrCAKHcESVuCOOSPwFXCgXBJyQuMIdIUUolxZORmvvpm5qJ3HixKX+fKRNZjwTzXx3d+LxjO0AetZg+iOJ2B0Rv0VEfz17e4XB+q+bi7Pjfy/OjidRrb75V1Krd2Nxdjyvmv/drnqmWsry25q0O/9OxFilMnk5yw/PXHx/ePrK1efOXxw7N3lu8tLoqVPHjx3qOzl6oiNxpnHdOPDR1MH9r7597fXxM9fe/embtL+7s/LGODplsH52m3qy04112Z6GdFLqYkdoSzEi0stVro3//ijGjqWy/njl0652DthU1Wqh2uz5OTNXBe5h6Wwe6EX5E336+jc/tmjqcVdYOB3xYlKP/2Z21EtKUcjqlJe9vu2kwYg4M/fPl+kRm7QOAQDQ6PrpiHi22fyvEA801PtftocyEBH/j4i9EXFfROyLiPsjanUfjIiH2mx/+Q7JnfOfav+6AlujdP73Qra3dfv8L5/9xUAxy+2pxV9Ozp6vTB7NzsmRKG9L8yMrtPH9y79+3qqscf6XHmn7+Vww68efpWULdBNjM2MbibnRwicRB0rN4k8i38ZJImJ/RBxYZxvnn/76YKuy1eNfQQf2mapfRTxVv/5zsSz+XNJyf3Lk+ZOjJ4a3R2Xy6HB+V9zp51/m32jV/obi74CF69XY2fT+X4p/INkeMX3l6oXafu10+23M//5Zy9c0673/+5K38uxc+uPDsZmZyyMRfclrtQf7ssLa46O3/jbP5/XT+//I4ebjf2/cOhMPR0R6Ex+KiEci4tGs749FxOMRcXiF+H986Yn32o9/hVX5Dkrjn1jt+kfj9W8/Ubzww7ftx59Lr//xWupI9sha/v+ttYMbOXcAAADwX1GovQc+KQwtpQuFoaH6e/j3xc5CZWp65pmzUx9cmqi/V34gyoV8pau/YT10JFsbzvOjy/LHsnXjL4o7avmh8anKRLeDhx63q8X4T/1R7HbvgE3n81rQu4x/6F3GP/Qu4x96l/EPvavZ+P+4C/0Att4qz/87tqofwNYz/4feZfxD7zL+oSe1/Gx8YUMf+ZfoUuK7vo19V8PaE1G4S0K+ZxLlaFpUWvOXWawzsa1pUbf/MwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHTGvwEAAP//EMvi5Q==") 17:00:12 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2952.599614][T29537] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 [ 2952.613042][T29537] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2952.614974][T29546] loop2: detected capacity change from 0 to 512 17:00:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBv/UjfJJTyaGkhUBAVj6RJH/TApQgkDiAhwaGIU0jSqtRtUBMkWkUQOIQjqsQdcUTiL+BCuSDghMQV7ggpQrm0cDJaezd1UzuJEycu9e8nbTLjmWjm292JxzO2A+hZg+mPJGJ3RPweEf317O0VBuu/bi7Ojv+zODueRLX61t9Jrd6NxdnxvGr+d7vqmWopy29r0u78uxFjlcrk5Sw/PHPxg+HpK1dfOH9x7NzkuclLo6dOHT92qO/k6ImOxJnGdePAx1MH97/2zrU3xs9ce+/nb9P+7s7KG+PolMH62W3q6U431mV7GtJJqYsdoS3FiEgvV7k2/vujGDuWyvrj1c+62jlgU1WrhWqz5+fMXBW4h6WzeaAX5U/06evf/NiiqcddYeF0xFxSj/9mdtRLSlHI6pSXvb7tpMGIODP371fpEZu0DgEA0Oj66Yh4vtn8rxAPNdS7L9tDGYiI+yNib0Q8EBH7IuLBiFrdhyPikTbbX75Dcuf8p9q/rsDWKJ3/vZTtbd0+/8tnfzFQzHJ7avGXk7PnK5NHs3NyJMrb0vzICm388MpvX7Qqa5z/pUfafj4XzPrxV2nZAt3E2MzYRmJutPBpxIFSs/iTyLdxkojYHxEH1tnG+We/OdiqbPX4V9CBfabq1xHP1K//XCyLP5e03J8cefHk6Inh7VGZPDqc3xV3+uXX+Tdbtb+h+Dtg4Xo1dja9/5fiH0i2R0xfuXqhtl873X4b83983vI1zXrv/77k7Tw7l/74aGxm5vJIRF/yeu3Bvqyw9vjorb/N83n99P4/crj5+N8bt87EoxGR3sSHIuKxiHg86/sTEfFkRBxeIf6fXn7q/fbjX2FVvoPS+CdWu/7ReP3bTxQv/Phd+/Hn0ut/vJY6kj2ylv9/a+3gRs4dAAAA/F8Uau+BTwpDS+lCYWio/h7+fbGzUJmannnu7NSHlybq75UfiHIhX+nqb1gPHcnWhvP86LL8sWzd+Mvijlp+aHyqMtHt4KHH7Wox/lN/FrvdO2DT+bwW9C7jH3qX8Q+9y/iH3mX8Q+9qNv4/6UI/gK23yvP/jq3qB7D1zP+hdxn/0LuMf+hJLT8bX9jQR/4lupT4vm9j39Ww9kQU7pKQ75lEOZoWldb8ZRbrTGxrWtTt/0wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACd8V8AAAD//95x4yU=") [ 2952.646049][T29541] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2952.661211][T29546] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2952.661411][T29541] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 [ 2952.669421][T29537] ext4_test_bit(bit=14, block=4) = 1 [ 2952.682881][T29537] is_bad_inode(inode)=0 [ 2952.687029][T29537] NEXT_ORPHAN(inode)=0 [ 2952.691118][T29537] max_ino=32 [ 2952.694313][T29537] i_nlink=1 17:00:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2952.713336][T29546] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2952.736496][T29555] loop4: detected capacity change from 0 to 512 [ 2952.747520][T29555] EXT4-fs (loop4): mounting ext3 file system using the ext4 subsystem 17:00:12 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r2, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r4, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2952.760264][T29546] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2952.773049][T29559] loop5: detected capacity change from 0 to 512 [ 2952.775077][T29546] ext4_test_bit(bit=14, block=4) = 1 [ 2952.784653][T29546] is_bad_inode(inode)=0 [ 2952.788893][T29546] NEXT_ORPHAN(inode)=0 [ 2952.792987][T29546] max_ino=32 [ 2952.796181][T29546] i_nlink=1 [ 2952.804254][T29559] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem 17:00:12 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r2, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r4, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2952.815082][T29564] loop0: detected capacity change from 0 to 512 [ 2952.824493][T29564] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 2952.833867][T29555] EXT4-fs (loop4): Cannot turn on journaled quota: type 0: error -2 [ 2952.846653][T29559] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 17:00:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$eJzs3MtvG0UYAPBv/UjfJJTyaGkh0CIqHkmTPuiBCwgkDiAhwaGIU0jSqtRtUBMkWkUQOIQjqsQdcUTiL+BCuSDghMQV7ggpQrm0cDJaezd1EzuNEycu9e8nbTLjWWvm292xZ2dsB9CzBtM/ScTuiPg9Ivrr2dt3GKz/u7k4O/7P4ux4EtXqW38ntf1uLM6O57vmz9tVz1RLWX5bk3rn340Yq1QmL2f54ZmLHwxPX7n6/PmLY+cmz01eGj19+sTxQ32nRk92JM40rhsHPp46uP+1d669MX7m2ns/f5u2d3dW3hhHpwzWj25TT3W6si7b05BOSl1sCG0pRkR6usq1/t8fxdixVNYfr37W1cYBm6paLVSbvT9n5qrAPSwdzQO9KH+jT+9/822Lhh53hYWX6jdAadw3s61eUopCtk952f1tJw1GxJm5f79Kt9ikeQgAgEbX0/HPc83Gf4V4qGG/+7I1lIGIuD8i9kbEAxGxLyIejKjt+3BEPNJm/ctXSFaOf6r96wpsjdLx34vZ2tbt47989BcDxSy3pxZ/OTl7vjJ5LDsmR6O8Lc2PrFLHD6/89kWrssbxX7ql9edjwawdf5WWTdBNjM2MbSTmRgufRhwoNYs/iXwZJ4mI/RFxYJ11nH/mm4Otyu4c/yo6sM5U/Tri6fr5n4tl8eeSluuTIy+cGj05vD0qk8eG86tipV9+nX+zVf0bir8DFq5XY2fT638p/oFke8T0lasXauu10+3XMf/H5y3vadZ7/fclb9fSfdljH43NzFweiehLXl/5+Oit5+b5fP/0+j96uHn/3xu3jsSjEZFexIci4rGIeDxr+xMR8WREHF4l/p9ePvJ++/GvMivfQWn8E3c6/9F4/ttPFC/8+F378efS83+iljqaPbKW17+1NnAjxw4AAAD+Lwq1z8AnhaGldKEwNFT/DP++2FmoTE3PPHt26sNLE/XPyg9EuZDPdPU3zIeOZHPDeX50Wf54Nm/8ZXFHLT80PlWZ6Hbw0ON2tej/qT+L3W4dsOl8Xwt6l/4PvUv/h96l/0Pv0v+hdzXr/590oR3A1kuOrFq8Y8saAmw543/oXfo/9C79H3pSy+/GFzb0lX+JLiW+79vYbzWsPRGFuyTkeyZRjqZFpTX/mMU6E9uaFnX7lQkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKAz/gsAAP//rGHiTw==") [ 2952.856215][T29559] EXT4-fs error (device loop5): ext4_orphan_get:1420: comm syz-executor.5: bad orphan inode 15 [ 2952.862213][T29564] EXT4-fs error (device loop0): ext4_map_blocks:577: inode #2: block 13: comm syz-executor.0: lblock 0 mapped to illegal pblock 13 (length 1) [ 2952.869422][T29555] EXT4-fs error (device loop4): ext4_xattr_ibody_find:2263: inode #15: comm syz-executor.4: corrupted in-inode xattr: e_value size too large [ 2952.897355][T29564] EXT4-fs (loop0): Cannot turn on journaled quota: type 0: error -117 17:00:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2952.913745][T29559] ext4_test_bit(bit=14, block=4) = 1 [ 2952.919058][T29559] is_bad_inode(inode)=0 [ 2952.923246][T29559] NEXT_ORPHAN(inode)=0 [ 2952.927306][T29559] max_ino=32 [ 2952.928457][T29573] loop3: detected capacity change from 0 to 512 [ 2952.930515][T29559] i_nlink=1 [ 2952.945280][T29555] EXT4-fs error (device loop4): ext4_orphan_get:1399: comm syz-executor.4: couldn't read orphan inode 15 (err -117) [ 2952.952255][T29574] loop2: detected capacity change from 0 to 512 17:00:12 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r2, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r4, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) [ 2952.973575][T29573] EXT4-fs (loop3): mounting ext3 file system using the ext4 subsystem [ 2952.987383][T29574] EXT4-fs (loop2): mounting ext3 file system using the ext4 subsystem [ 2952.998095][T29576] loop5: detected capacity change from 0 to 512 [ 2953.006248][T29573] EXT4-fs (loop3): Cannot turn on journaled quota: type 0: error -2 [ 2953.016398][T29576] EXT4-fs (loop5): mounting ext3 file system using the ext4 subsystem [ 2953.027909][T29574] EXT4-fs (loop2): Cannot turn on journaled quota: type 0: error -2 [ 2953.028265][T29582] loop0: detected capacity change from 0 to 512 [ 2953.036365][T29573] EXT4-fs error (device loop3): ext4_orphan_get:1394: inode #15: comm syz-executor.3: casefold flag without casefold feature [ 2953.046357][T29574] EXT4-fs error (device loop2): ext4_orphan_get:1420: comm syz-executor.2: bad orphan inode 15 [ 2953.065969][T29582] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem 17:00:12 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000600)={0x105, 0x3, 0x6, 0x4cd}, 0x10, r4, 0xffffffffffffffff, 0x0, &(0x7f0000000980)}, 0x90) mlock(&(0x7f0000035000/0x2000)=nil, 0x2000) mknodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000e00)={0xffffffffffffffff, 0xe0, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, &(0x7f00000012c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000c00)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f0000000c80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000cc0)}}, 0x10) pipe2$watch_queue(0x0, 0x80) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r5 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000004000/0x1000)=nil) shmat(r5, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) 17:00:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") [ 2953.067177][T29573] EXT4-fs error (device loop3): ext4_orphan_get:1399: comm syz-executor.3: couldn't read orphan inode 15 (err -117) [ 2953.079465][T29574] ext4_test_bit(bit=14, block=4) = 1 [ 2953.091644][T29574] is_bad_inode(inode)=0 [ 2953.095836][T29574] NEXT_ORPHAN(inode)=0 [ 2953.099912][T29574] max_ino=32 [ 2953.103106][T29574] i_nlink=1 [ 2953.103481][T29576] EXT4-fs (loop5): Cannot turn on journaled quota: type 0: error -2 17:00:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0006, &(0x7f00000000c0)={[{@jqfmt_vfsold}, {@resgid}, {@bsdgroups}, {@noload}, {@data_err_ignore}, {@usrjquota, 0x22}, {@init_itable_val={'init_itable', 0x3d, 0x601}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x3}}]}, 0xfe, 0x452, &(0x7f0000000900)="$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") 17:00:12 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x400000, 0x0, &(0x7f0000000000/0x400000)=nil) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000000a00)={0x8}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x4001, 0x3, 0x2b8, 0x180, 0x0, 0x148, 0x0, 0x148, 0x220, 0x240, 0x240, 0x220, 0x240, 0x7fffffe, 0x0, {[{{@ip={@rand_addr, @local, 0x0, 0x0, 'ip6gretap0\x00', 'veth1_to_batadv\x00', {}, {}, 0x88}, 0x0, 0x118, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'lo\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0xed}}}, @common=@inet=@multiport={{0x50}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@uncond, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x318) r1 = dup(0xffffffffffffffff) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000e80)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0xd0, 0xd0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000000e40), {[{{@uncond, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mark={{0x30}, {0x1ff, 0x7f}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x4, 0x0, 0x2}, {0x4, 0x2, 0x2}, 0x1, 0x20e}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, 0x0, 0xff, 'ip6gre0\x00', 'veth1_to_team\x00', {}, {}, 0x5e, 0x1, 0x59}, 0x0, 0x98, 0x1c0, 0x0, {}, [@common=@icmp={{0x28}, {0xb, "c383", 0x1}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:chfn_exec_t:s0\x00'}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x1f}, @remote, 0xff, 0xff, 'wg0\x00', 'batadv_slave_1\x00', {0xff}, {0xff}, 0x6c, 0x0, 0x1}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00', {0x5}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x440) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xc, 0x8, &(0x7f00000012c0)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000000)={0xffffffff, 0x7, 0x0, 0xfffffffe}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r2}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) set_mempolicy(0x3, 0x0, 0xe0) mlock(&(0x7f0000000000/0x11000)=nil, 0x11000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000240)=[{}, {}, {}, {}, {}], 0x28, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x20, &(0x7f0000000740)={0x0, 0x0, 0x0, &(0x7f0000002140)=""/4089, 0xff9}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000bc0)={'ip6gre0\x00', &(0x7f0000000b40)={'syztnl2\x00', r3, 0xdb9ffef01af65fdc, 0x89, 0xfd, 0xff, 0x3a, @mcast2, @remote, 0x80, 0x40, 0x0, 0x69}}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1a, 0x0, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x1}, 0x8, 0x10, &(0x7f0