[ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.153' (ECDSA) to the list of known hosts. 2020/09/27 10:56:12 fuzzer started 2020/09/27 10:56:12 dialing manager at 10.128.0.26:43085 2020/09/27 10:56:12 syscalls: 3358 2020/09/27 10:56:12 code coverage: enabled 2020/09/27 10:56:12 comparison tracing: enabled 2020/09/27 10:56:12 extra coverage: enabled 2020/09/27 10:56:12 setuid sandbox: enabled 2020/09/27 10:56:12 namespace sandbox: enabled 2020/09/27 10:56:12 Android sandbox: /sys/fs/selinux/policy does not exist 2020/09/27 10:56:12 fault injection: enabled 2020/09/27 10:56:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/09/27 10:56:12 net packet injection: enabled 2020/09/27 10:56:12 net device setup: enabled 2020/09/27 10:56:12 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/09/27 10:56:12 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/09/27 10:56:12 USB emulation: enabled 2020/09/27 10:56:12 hci packet injection: enabled 2020/09/27 10:56:12 wifi device emulation: enabled 10:59:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066010f", 0xf, 0x800}, {&(0x7f0000000480)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000001280)=ANY=[]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r1 = getgid() getgroups(0x6, &(0x7f0000000040)=[0xee00, 0xee01, 0x0, 0x0, 0xee01, r1]) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000180)) 10:59:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) open(0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x3c) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xe00480f3, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0xef013080, 0x1f4}}], 0x1, 0x100, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x170) 10:59:13 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x0, 0x0) close(r0) 10:59:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) open(&(0x7f0000000180)='./cgroup/cgroup.procs\x00', 0x4000, 0x0) 10:59:13 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@filter={'filter\x00', 0xe, 0x3, 0x90, [0x0, 0x20000280, 0x20000e64, 0x20000e94], 0x0, 0x0, &(0x7f0000000280)=[{}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x108) syzkaller login: [ 243.537732][ T6882] IPVS: ftp: loaded support on port[0] = 21 [ 243.579166][ T6884] IPVS: ftp: loaded support on port[0] = 21 [ 243.824793][ T6884] chnl_net:caif_netlink_parms(): no params data found [ 243.984959][ T6882] chnl_net:caif_netlink_parms(): no params data found [ 244.033316][ T6886] IPVS: ftp: loaded support on port[0] = 21 [ 244.130372][ T6884] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.138745][ T6884] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.164628][ T6884] device bridge_slave_0 entered promiscuous mode [ 244.205597][ T6882] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.213369][ T6882] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.221264][ T6882] device bridge_slave_0 entered promiscuous mode [ 244.231120][ T6884] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.240311][ T6884] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.250044][ T6884] device bridge_slave_1 entered promiscuous mode [ 244.258227][ T6882] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.267290][ T6882] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.276170][ T6882] device bridge_slave_1 entered promiscuous mode [ 244.290844][ T6888] IPVS: ftp: loaded support on port[0] = 21 [ 244.390143][ T6882] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 244.436136][ T6882] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 244.461725][ T6884] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 244.541866][ T6890] IPVS: ftp: loaded support on port[0] = 21 [ 244.552024][ T6884] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 244.632913][ T6901] IPVS: ftp: loaded support on port[0] = 21 [ 244.647138][ T6882] team0: Port device team_slave_0 added [ 244.669873][ T6884] team0: Port device team_slave_0 added [ 244.681898][ T6884] team0: Port device team_slave_1 added [ 244.690459][ T6882] team0: Port device team_slave_1 added [ 244.773610][ T6884] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 244.780574][ T6884] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.807844][ T6884] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 244.824949][ T6882] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 244.831909][ T6882] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.859100][ T6882] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 244.908507][ T6884] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 244.915606][ T6884] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.945375][ T6884] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 244.958064][ T6882] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 244.965944][ T6882] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 244.992023][ T6882] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 245.044426][ T6886] chnl_net:caif_netlink_parms(): no params data found [ 245.121740][ T6884] device hsr_slave_0 entered promiscuous mode [ 245.129845][ T6884] device hsr_slave_1 entered promiscuous mode [ 245.141148][ T6882] device hsr_slave_0 entered promiscuous mode [ 245.150021][ T6882] device hsr_slave_1 entered promiscuous mode [ 245.157305][ T6882] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 245.165671][ T6882] Cannot create hsr debugfs directory [ 245.349177][ T6888] chnl_net:caif_netlink_parms(): no params data found [ 245.434455][ T5] Bluetooth: hci0: command 0x0409 tx timeout [ 245.521325][ T6886] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.529297][ T6886] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.539061][ T6886] device bridge_slave_0 entered promiscuous mode [ 245.573991][ T6886] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.581177][ T6886] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.589627][ T6886] device bridge_slave_1 entered promiscuous mode [ 245.596169][ T17] Bluetooth: hci1: command 0x0409 tx timeout [ 245.604363][ T6901] chnl_net:caif_netlink_parms(): no params data found [ 245.675228][ T6890] chnl_net:caif_netlink_parms(): no params data found [ 245.727688][ T6886] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 245.787014][ T6886] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 245.803985][ T6888] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.811136][ T6888] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.821180][ T6888] device bridge_slave_0 entered promiscuous mode [ 245.846455][ T6882] debugfs: Directory 'ethtool' with parent 'netdevsim0' already present! [ 245.871421][ T6888] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.880054][ T6888] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.888393][ T6888] device bridge_slave_1 entered promiscuous mode [ 245.912544][ T2479] Bluetooth: hci2: command 0x0409 tx timeout [ 245.933616][ T6882] debugfs: Directory 'ethtool' with parent 'netdevsim0' already present! [ 245.968231][ T6888] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 245.978442][ T6901] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.987324][ T6901] bridge0: port 1(bridge_slave_0) entered disabled state [ 245.996351][ T6901] device bridge_slave_0 entered promiscuous mode [ 246.014840][ T6886] team0: Port device team_slave_0 added [ 246.027174][ T6888] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.028345][ T6882] debugfs: Directory 'ethtool' with parent 'netdevsim0' already present! [ 246.051056][ T6901] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.059127][ T6901] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.067573][ T6901] device bridge_slave_1 entered promiscuous mode [ 246.088460][ T6886] team0: Port device team_slave_1 added [ 246.131220][ T6888] team0: Port device team_slave_0 added [ 246.158778][ T6888] team0: Port device team_slave_1 added [ 246.162651][ T2554] Bluetooth: hci3: command 0x0409 tx timeout [ 246.177565][ T6882] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 246.185770][ T6884] debugfs: Directory 'ethtool' with parent 'netdevsim1' already present! [ 246.242014][ T6884] debugfs: Directory 'ethtool' with parent 'netdevsim1' already present! [ 246.243850][ T6901] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.259667][ T6882] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 246.271653][ T6890] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.280025][ T6890] bridge0: port 1(bridge_slave_0) entered disabled state [ 246.288400][ T6890] device bridge_slave_0 entered promiscuous mode [ 246.305988][ T6886] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 246.314677][ T6886] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.341336][ T6886] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 246.359838][ T6884] debugfs: Directory 'ethtool' with parent 'netdevsim1' already present! [ 246.360359][ T6901] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.378556][ T6882] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 246.389908][ T6890] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.397163][ T7917] Bluetooth: hci4: command 0x0409 tx timeout [ 246.406445][ T6890] bridge0: port 2(bridge_slave_1) entered disabled state [ 246.414879][ T6890] device bridge_slave_1 entered promiscuous mode [ 246.422436][ T6888] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 246.431887][ T6888] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.458585][ T6888] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 246.470864][ T6886] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 246.478005][ T6886] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.504258][ T6886] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 246.546928][ T6882] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 246.554741][ T2479] Bluetooth: hci5: command 0x0409 tx timeout [ 246.578137][ T6888] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 246.585245][ T6888] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 246.611595][ T6888] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 246.623460][ T6884] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 246.643003][ T6886] device hsr_slave_0 entered promiscuous mode [ 246.652182][ T6886] device hsr_slave_1 entered promiscuous mode [ 246.662317][ T6886] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 246.670791][ T6886] Cannot create hsr debugfs directory [ 246.705264][ T6884] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 246.721895][ T6890] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.734588][ T6901] team0: Port device team_slave_0 added [ 246.764631][ T6888] device hsr_slave_0 entered promiscuous mode [ 246.772434][ T6888] device hsr_slave_1 entered promiscuous mode [ 246.779928][ T6888] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 246.788035][ T6888] Cannot create hsr debugfs directory [ 246.797718][ T6884] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 246.810951][ T6890] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.826637][ T6901] team0: Port device team_slave_1 added [ 246.857740][ T6884] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 246.950148][ T6890] team0: Port device team_slave_0 added [ 246.967093][ T6901] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 246.974915][ T6901] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.003788][ T6901] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 247.019347][ T6901] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 247.026731][ T6901] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.052856][ T6901] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 247.067688][ T6890] team0: Port device team_slave_1 added [ 247.219389][ T6890] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 247.226626][ T6890] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.253183][ T6890] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 247.268461][ T6901] device hsr_slave_0 entered promiscuous mode [ 247.276834][ T6901] device hsr_slave_1 entered promiscuous mode [ 247.284354][ T6901] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 247.291914][ T6901] Cannot create hsr debugfs directory [ 247.315355][ T6890] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 247.322324][ T6890] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 247.356453][ T6890] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 247.447858][ T6890] device hsr_slave_0 entered promiscuous mode [ 247.456446][ T6890] device hsr_slave_1 entered promiscuous mode [ 247.464179][ T6890] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 247.471745][ T6890] Cannot create hsr debugfs directory [ 247.513313][ T2554] Bluetooth: hci0: command 0x041b tx timeout [ 247.545930][ T6888] debugfs: Directory 'ethtool' with parent 'netdevsim3' already present! [ 247.590775][ T6888] debugfs: Directory 'ethtool' with parent 'netdevsim3' already present! [ 247.635201][ T6888] debugfs: Directory 'ethtool' with parent 'netdevsim3' already present! [ 247.676812][ T2479] Bluetooth: hci1: command 0x041b tx timeout [ 247.719192][ T6882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.734578][ T6888] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 247.766004][ T6886] debugfs: Directory 'ethtool' with parent 'netdevsim2' already present! [ 247.770710][ T6884] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.793436][ T6888] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 247.834097][ T6888] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 247.842379][ T6886] debugfs: Directory 'ethtool' with parent 'netdevsim2' already present! [ 247.856127][ T6882] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.874668][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.887027][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.898839][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.907788][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 247.916791][ T6888] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 247.942701][ T6886] debugfs: Directory 'ethtool' with parent 'netdevsim2' already present! [ 247.947120][ T6884] 8021q: adding VLAN 0 to HW filter on device team0 [ 247.981413][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 247.990569][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.003681][ T2479] Bluetooth: hci2: command 0x041b tx timeout [ 248.009938][ T2554] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.017302][ T2554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.027677][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.036840][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.045866][ T2554] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.052966][ T2554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.060831][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.070133][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.121876][ T6886] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 248.141236][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.151192][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 248.160358][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.172774][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.182030][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.191493][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 248.201329][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 248.210436][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.217575][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.233498][ T2479] Bluetooth: hci3: command 0x041b tx timeout [ 248.252649][ T6890] debugfs: Directory 'ethtool' with parent 'netdevsim4' already present! [ 248.253402][ T6886] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 248.272572][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 248.282538][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.295896][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 248.305434][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 248.314621][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.321772][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.330728][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 248.339589][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 248.350030][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 248.364319][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 248.372874][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 248.389849][ T6886] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 248.390310][ T6890] debugfs: Directory 'ethtool' with parent 'netdevsim4' already present! [ 248.416199][ T6882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 248.424638][ T6890] debugfs: Directory 'ethtool' with parent 'netdevsim4' already present! [ 248.440775][ T6886] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 248.450475][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 248.473901][ T2554] Bluetooth: hci4: command 0x041b tx timeout [ 248.494395][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 248.520922][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 248.533044][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 248.543167][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 248.552484][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 248.561967][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 248.571615][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 248.586771][ T6884] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 248.602661][ T6884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 248.619853][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 248.634021][ T17] Bluetooth: hci5: command 0x041b tx timeout [ 248.634142][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 248.656213][ T6890] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 248.670477][ T6890] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 248.687041][ T6890] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 248.705965][ T6901] debugfs: Directory 'ethtool' with parent 'netdevsim5' already present! [ 248.730989][ T6890] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 248.758798][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 248.767342][ T6901] debugfs: Directory 'ethtool' with parent 'netdevsim5' already present! [ 248.781120][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 248.818393][ T6882] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 248.825784][ T6901] debugfs: Directory 'ethtool' with parent 'netdevsim5' already present! [ 248.866616][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 248.875488][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 248.905457][ T6884] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 248.912705][ T6901] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 248.949668][ T6888] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.957237][ T6901] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 248.974939][ T6901] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 248.990093][ T6901] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 249.021339][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 249.031230][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 249.080198][ T6888] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.117674][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.127340][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.138545][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.148773][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.158979][ T2479] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.166121][ T2479] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.177098][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.226115][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.238662][ T2479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.249007][ T2479] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.256303][ T2479] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.302083][ T6890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.309379][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 249.325250][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 249.336087][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 249.345546][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 249.355268][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 249.395885][ T6882] device veth0_vlan entered promiscuous mode [ 249.419251][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 249.431657][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 249.441662][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 249.451874][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 249.461348][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 249.476772][ T6886] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.501069][ T6882] device veth1_vlan entered promiscuous mode [ 249.530562][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 249.539602][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 249.549422][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 249.558889][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 249.567535][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 249.578119][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.586979][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.595733][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 249.606717][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 249.626081][ T6890] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.637460][ T6884] device veth0_vlan entered promiscuous mode [ 249.654818][ T7917] Bluetooth: hci0: command 0x040f tx timeout [ 249.689735][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 249.698948][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 249.740638][ T6884] device veth1_vlan entered promiscuous mode [ 249.752048][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 249.762535][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.771848][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.787495][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 249.797276][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 249.810739][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 249.820950][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 249.834596][ T8189] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.841951][ T8189] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.851517][ T8189] Bluetooth: hci1: command 0x040f tx timeout [ 249.857130][ T6888] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 249.875760][ T6888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 249.896645][ T6886] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.922117][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 249.936473][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 249.950416][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 249.960387][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 249.969519][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 249.979217][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 249.989265][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.997013][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.005646][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.015139][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.024445][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.031806][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.039940][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 250.050360][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.059627][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.068751][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.078026][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.085348][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.098298][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.106666][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.116870][ T5] Bluetooth: hci2: command 0x040f tx timeout [ 250.123606][ T6882] device veth0_macvtap entered promiscuous mode [ 250.160051][ T6882] device veth1_macvtap entered promiscuous mode [ 250.170235][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 250.181128][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 250.192932][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.202510][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 250.210777][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 250.219062][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.228852][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.239968][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.249068][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.258413][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.280982][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 250.289169][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.314836][ T2479] Bluetooth: hci3: command 0x040f tx timeout [ 250.340606][ T6901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.348278][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 250.357237][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.366037][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 250.375591][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.384469][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.395708][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.410667][ T6888] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 250.429611][ T6890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 250.441150][ T6882] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 250.454107][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 250.462374][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.472078][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.482073][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 250.491351][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 250.509772][ T6884] device veth0_macvtap entered promiscuous mode [ 250.528227][ T6882] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 250.555748][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 250.564978][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 250.573609][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 250.586355][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.595836][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.603736][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.612885][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 250.622583][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 250.632230][ T5] Bluetooth: hci4: command 0x040f tx timeout [ 250.646364][ T6901] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.656048][ T6884] device veth1_macvtap entered promiscuous mode [ 250.678291][ T6882] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 250.688466][ T6882] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 250.698042][ T6882] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 250.707413][ T6882] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 250.716890][ T2554] Bluetooth: hci5: command 0x040f tx timeout [ 250.746912][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 250.755480][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 250.763638][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 250.773172][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.782124][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.791523][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.800770][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.807947][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.816082][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.825107][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.835593][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.842664][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.890831][ T6886] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 250.908634][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 250.918238][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 250.927940][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 250.937619][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.947308][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.956272][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 250.964429][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 250.984350][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 251.000334][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.009734][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 251.024643][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.058604][ T6884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 251.072580][ T6884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 251.089678][ T6884] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 251.099886][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.113068][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 251.122161][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 251.132412][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 251.141744][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 251.151418][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 251.159980][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 251.180350][ T6888] device veth0_vlan entered promiscuous mode [ 251.237952][ T6884] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 251.264091][ T6884] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 251.285802][ T6884] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 251.302736][ T6890] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 251.346100][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 251.365303][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.377087][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 251.386253][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 251.410382][ T6884] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 251.454222][ T6884] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 251.463237][ T6884] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 251.472296][ T6884] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 251.493240][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 251.543389][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 251.551325][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 251.581719][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.592673][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.601692][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.610410][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 251.637399][ T6901] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.647801][ T6888] device veth1_vlan entered promiscuous mode [ 251.665980][ T6886] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 251.674790][ T17] Bluetooth: hci0: command 0x0419 tx timeout [ 251.691961][ T21] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 251.708410][ T21] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 251.720480][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 251.884273][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 251.891843][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 251.904512][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.917644][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.930216][ T5] Bluetooth: hci1: command 0x0419 tx timeout [ 251.934575][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 251.953244][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 251.983366][ T6888] device veth0_macvtap entered promiscuous mode [ 252.019305][ T8226] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 252.051408][ T6901] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.092169][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 252.110722][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 252.135339][ T21] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 252.143341][ T21] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 252.160644][ T6888] device veth1_macvtap entered promiscuous mode [ 252.175272][ T8189] Bluetooth: hci2: command 0x0419 tx timeout 10:59:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066010f", 0xf, 0x800}, {&(0x7f0000000480)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000001280)=ANY=[]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r1 = getgid() getgroups(0x6, &(0x7f0000000040)=[0xee00, 0xee01, 0x0, 0x0, 0xee01, r1]) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000180)) [ 252.194030][ T6890] device veth0_vlan entered promiscuous mode [ 252.229574][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 252.256195][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 252.266696][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 252.278394][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 252.298780][ T2554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.352242][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.375992][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.395179][ T8189] Bluetooth: hci3: command 0x0419 tx timeout [ 252.397090][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 252.412009][ T8250] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 252.454291][ C1] hrtimer: interrupt took 50182 ns 10:59:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066010f", 0xf, 0x800}, {&(0x7f0000000480)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000001280)=ANY=[]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) r1 = getgid() getgroups(0x6, &(0x7f0000000040)=[0xee00, 0xee01, 0x0, 0x0, 0xee01, r1]) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000180)) [ 252.476747][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.502412][ T6886] device veth0_vlan entered promiscuous mode [ 252.523331][ T6890] device veth1_vlan entered promiscuous mode [ 252.557643][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.585039][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.599420][ T6888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 252.621260][ T133] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 252.642278][ T6888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.661107][ T133] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 252.683510][ T6888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 252.706399][ T6888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 252.725652][ T8189] Bluetooth: hci4: command 0x0419 tx timeout [ 252.731412][ T8260] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 252.775224][ T6888] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 252.805360][ T8189] Bluetooth: hci5: command 0x0419 tx timeout [ 252.819524][ T6886] device veth1_vlan entered promiscuous mode 10:59:23 executing program 0: [ 252.893871][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 252.902628][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 252.932918][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 10:59:23 executing program 0: [ 252.958000][ T6888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 252.997849][ T6888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.020082][ T6888] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 253.039896][ T6888] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.059249][ T6888] batman_adv: batadv0: Interface activated: batadv_slave_1 10:59:23 executing program 0: [ 253.093984][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 253.114184][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 253.143596][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 253.161956][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 10:59:23 executing program 0: [ 253.201177][ T6888] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 253.237655][ T6888] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 253.270550][ T6888] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 253.297846][ T6888] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 10:59:23 executing program 0: [ 253.396916][ T6890] device veth0_macvtap entered promiscuous mode [ 253.435677][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.453126][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.485568][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 253.517925][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 253.574244][ T6890] device veth1_macvtap entered promiscuous mode [ 253.602003][ T6901] device veth0_vlan entered promiscuous mode [ 253.612941][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 253.635319][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 253.643391][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 253.662992][ T6886] device veth0_macvtap entered promiscuous mode [ 253.700780][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 253.710521][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 253.722851][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 253.765538][ T6890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.781003][ T6890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.791207][ T6890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.812481][ T6890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.822882][ T6890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 253.833685][ T6890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.847317][ T6890] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 253.860199][ T6886] device veth1_macvtap entered promiscuous mode [ 253.873665][ T6901] device veth1_vlan entered promiscuous mode [ 253.886777][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 253.902219][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 253.913273][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 253.932483][ T6890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 253.948978][ T6890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 10:59:24 executing program 1: [ 253.969110][ T6890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 253.980564][ T6890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 253.991866][ T6890] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.005679][ T6890] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.019723][ T6890] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 254.056283][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.080169][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 254.135276][ T6890] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.144103][ T6890] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.192284][ T6890] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.205082][ T6890] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.250894][ T6886] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.263159][ T6886] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.281361][ T6886] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.292503][ T6886] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.302472][ T6886] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.313282][ T6886] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.323637][ T6886] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.334442][ T6886] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.346908][ T6886] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 254.381721][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 254.392959][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 254.402556][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 254.411409][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 254.436067][ T27] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 254.436379][ T6901] device veth0_macvtap entered promiscuous mode [ 254.444186][ T27] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 254.471004][ T6886] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.487180][ T6886] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.498212][ T6886] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.509021][ T6886] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.520436][ T6886] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.531320][ T6886] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.541944][ T6886] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.552800][ T6886] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.577813][ T6886] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 254.589382][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 254.603202][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 254.612671][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 254.623686][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 254.654690][ T6901] device veth1_macvtap entered promiscuous mode [ 254.671691][ T6886] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.682800][ T6886] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.692728][ T6886] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.701554][ T6886] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.809048][ T27] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 254.831579][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.842668][ T27] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 254.858866][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.869865][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.882118][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.892405][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.904373][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.915297][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.926653][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.937196][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 254.947984][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 254.960216][ T6901] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 254.981625][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 254.995044][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.008305][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.019322][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.030025][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.041692][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.052443][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.063808][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.074264][ T6901] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 255.084916][ T6901] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 255.096840][ T6901] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 255.104334][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 255.119490][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 255.130799][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 255.140980][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 255.150903][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 255.179408][ T6901] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.190339][ T6901] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.205827][ T6901] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.214595][ T6901] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.247930][ T27] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 255.256384][ T27] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 255.285698][ T7] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 255.293705][ T7] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 255.312882][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 255.376989][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 255.417951][ T7] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 255.461243][ T7] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 255.518856][ T8162] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 255.551420][ T192] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 255.567877][ T192] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 255.628303][ T330] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 255.648837][ T330] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 255.661785][ T7917] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 255.728407][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 255.759310][ T192] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 255.788718][ T192] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 255.811413][ T8189] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 255.864030][ T8362] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:59:26 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 255.993504][ T8362] EXT4-fs (loop2): re-mounted. Opts: 10:59:26 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x24004019) sendmsg$sock(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000240)="c0", 0x1}], 0x1, &(0x7f0000001700)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) recvmsg(r0, &(0x7f000000ffc0)={0x0, 0x0, &(0x7f000000fe80)=[{&(0x7f000000fd40)=""/180, 0xb4}], 0x1}, 0x1a061) 10:59:26 executing program 0: 10:59:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x0, 0x0) close(r0) 10:59:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086607, &(0x7f00000005c0)) socket$kcm(0x2, 0x0, 0x2) 10:59:26 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x2d, 0x0, 0x0, 0x6, 0x0, 0x8001, 0x1000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_bp, 0x4000, 0x0, 0x7, 0x0, 0x4, 0x0, 0x6}, 0x0, 0x7, 0xffffffffffffffff, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x20043608) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200)=0xffffff7f00000000, 0x2fde00) 10:59:26 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x2, 0x4, 0x6d, 0x8000000000000002, 0x0, 0x0}, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000000)="a6", 0x0}, 0x20) 10:59:26 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b02, &(0x7f0000000000)='wlan1\x00\x1f\x1a\xec\xb5\x12\x03F\xd9U\x1c\x0e\x00\x00\x00\x00\x00\x00\x00\x00\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b8\x84c\xf2\xc2\fpp.{\xb2\xb5:f\xcb\xe8oOArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2\x9d\xe9\x00\x00\x00)-v\x91WQ\xfd\xdcSE;\x9d\xc3\xc1LO\xf1\xf7\xbe\xdc\xd0Y\a\xdf\x11\r\x9a\xfe#N\a\xc6\xf3I\x89tZU#Ifx\xc3\xeb\xbe\xb6efpM\xc8\xaa\x88BA\n\xd1\x16\x81\x96ZI\xb2\xb5\xf2\xe6\xf5\x00\x92\r\xf6\x8d\x95\x9db\xe2\xc4\xad\xcb>\x890xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') [ 256.538996][ T8388] EXT4-fs (loop2): re-mounted. Opts: 10:59:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:59:27 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:27 executing program 3: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="8b093e03a55be3339f277c9f0786540bb7b8b2985a02f045cef065e02a68de92e0aa5e1e032c79cce5952c3584f240b504b4ad7810e543c3aae65c1cdd10ad9881686faf4648c709f26611099351f6aac1b2a2bccec1655967a2beb1fcbd4efb4da22ac5de3e4fbb4f46733758a9a6fd045d054534d6b3931092c1c97ad51dbbde4bab82696e4091018ec8a9b2c5a3fc27068f5bf8ea803d26035f45ffa197e85a8059159955794659df6e0aa74314823c46ce894e2891580a45a09cc2a4002077f6701f55878c6e3c0974af537b2c1935f591ef5ff72ce73d6c3593a5cae5a6e46f1377ef3d8a3cac2604200c3b9fcde28cd7847adc5d391cd8cc9f97e2a18ff3d35e27ea64a583f13d2fdb8364796f1c24962e7d3dc2c3275c007f16c599681bb723c3fd468d352e145edcd81e217efe086dd38da1fa95141fe0b68a3ad9f48ff6327337f630e3009970dbbd2ecb1714738b55e45acaf143d99cc113e95f9eaf233a30d312664e9d30d1df6f861af42102c420fbc0c1b76fbe591b0bb3991376bf028bda11337aff82fad5f25f897b1528c58840f760ea2f48426c661149880cfc302afc4bb00614c4871f60d1cb43911a85e1be26571fda6571a0fe2b02ba473818fb73d917fe33e01bbece39a35da6986d8e12c3bc4ab318e3dbc085e3e10efeda3dfe81c542c203acde3a767e81dc877f78721abdedfc63a349d1cdeeef7867c5bea031f56c8fa2264169f641a7d18fbdc5a7e0ce69e2435769eb1da4129be6d2f66900f2e1e120eec83311711f0fb9a5f6394b6c75db494f8e29d2e23b03992c59c4a42740870342a3cc062c5c0a9aa072ecf7f5a296c783c4f3c1fc5720527731b0c88e6a18c078a44868f4165761bc9532c458343f0311fb484e19fb9e7f20c84d748ca64c9cf3de0d4b689ec7233812701ed5de605c9ed7e59ff70ae484d70cd0080153504052d6bd5cbc0b3baeb8ffec61a518a9d27584ddaecd18e5bbdf631f0de1a7654d9dc949a52806174d7e4dd2266c2890f5aa9693ebf581a9521ad7fc5254bdd97cc195a063810ae89d59d2277fbfeb452148ab7fd15ed801359c19ceeb6116cd6b6e4b8de5502b3646f113e7318affb22f3fe9e66a17b99d41af134c334e0a7256f2abe51837d9072cd632ed96e82f4e16b3949319b8568e23309433c387199bdf695bcac8a0c4c7db1da63521de431954a2da866e951f3068c28ad6927be7dfc6a306286d30197bb780f46e728bb5c619408e69e1d10fcd7a25b9dbc0f987489ddfea1a69cd18040b52ad69470aa1c52c527d19e740f894f9977009a101d577d0375c06b0b60b7e70d9bb679af9452ced0265bf1cfb6c2f75df8c1252b043497ab1e50bf8a2ee1aaadcda23e0c45165be68a87ce3b89fc51ad8595e06a06caa8aca9cf51d670aaa6eda5bce5d3d83051ce828a7eaeb8d0718c8561ed885d4afcd40a97d4a14eff387175b3f260b3b7c3f0b6c768fa097644e4264ecfe30bee0cded0d2289c8be510bd0c1d6087d02225631b230c9f945d7e26ad4b4b2d8aa33fbf4ed0a119a94dd0d9ca3aff0b1847c3f293a29b8b7182c8c99bdd82a8e6de640960cd1c81567afee2d696ba4fc5d2a37308e24cc7fccff4eade9f560546cd5b4e273a0db00e0c972715e044835d5d0982c08bdfca4d0b130651652908891a408d01f8445434a93346b8467ff44989dfa952b1d0208d75ef5a18a83f6051105a4914aceb43252ceeb0a11506b87ef465b76f93325f3416d3b73294fb08611ed599d76f4e5817fc2fe2c497833e401c84962af3bed274c8f827bab63d0b08ec457f2a58464f5263cbf18b5b7c4f12fa625511e584a63faabd2eb366820cd7089190855129f96b7e4e29b158a5926c1b38a6381f9170b71116be2cc142ac6577ee4ecd216b2d3e2e331b49254739e1dcb7ca674be69e99cca7a276a8f10077ff0eb8bb62079e4ed5f1da080ef622a419d25297c77e881b3a95f017a9cbaaf6fb31de215a65ba687f8d5809a7fdd90a2838948758d58318e04f907a4228c61d1b439f4f7d15dc16cabcfd69b3830d4a1e547e2568d1a6574b355bf4217e2e6245f4001bd984e1c848edee910fc0faccb2b4533fa2c9fc400cdf3a4e6d24af2d08d25459063003df84dbfe8dc7159524c3e40d7b65d35de15795a6e36eb79095bd200a56860f2f8a5bd683de3465d15dc7bc6bdb1c180d0249c1b4b2a0767073aa9580a5d16fb397ea588ad0f162d72332ff2c28539ca3e5cd1bd3cfa1b2bc5d04c7d27599e6122b5dfecc6b12952aecc73660c93bc0140dafaab87d36ada484eea0c2524bfd359dc23e1d566909a4c84befc570246c011483ca1828c7f1f200b0f8a334b053fa7d2bf7921d7831abcd1c5e5d013dea0a07e6963aa344d5887c49d7776538627ed0e9ca09db695d310de10dd741eb08975eef9458caec6c79dbbe27c54b31ea3811462e1be2be71440115b8fce258a181a1bd23bc8de71507b82800db9d3d52d808d733e51a92f071fc268b92e028d08d0ee28b2d63a6df9ebf7540e5f5cfba17f714ae4dfd5352f12a656672bc36b68c9579a5ef2c1d94b6f1b800c118b66f4d29f10a72c9c958f574e9520523d820a3ca6b918b1fdbf9d3f5f8ccc68b66aba4a015afe07b42dff2d8e1aae2c6346c6adb1375b972a81dae07224650c91f8b2287c9a13613f975b09ee733c2a7d6f22cd04af0e173e875e0ad59dc6516aa1dd78f62ad8b70de6a5e1d396730c2c6310b0b83da245350249713bb6b1b7e6c5b28283af1ef5ffa8eb75524044eb34bc70c3b789c30b2cc69c5200c99b9495989477d40c99c67c11f0083ae00bf8cb9c9f562a73635c5be59683f42f3ea57581309f13f153d648bc01f3fe0bc983462c07bb84867ae2733591d8d3fc5cb100604f747cbdff4d0f6a419bd03f3664ec76601533c70a27f6b81c5371e65725c41187ec5836846fefd085169a61b3063d2b2af5a092b48dffe6875fe474dbb1b63dbf028a66a2f4225612e97d9f6482c6eb49d0c35cc834f22d365b008fbf178d563f6b6a19753edd8897b65b39e117ce11c9d7c497e63e68a79f96b3477d994178a8a1738d5d1e2e6cf99139c75f4c8b35e03949b466d3d239ac762d51bdccab8d85c690a404536f87b116e4a2c24574e7058d7d2f37f260d9f039605e6668aa08154de7985f2a9cc6122110fc219dda55a9dcb4768e26459b31fc17c51356fe0b437116a4943adf75a26849d9ff51841622af09769c8823a043c59176811c096e1916582424307847466fe9b1707a618ad53e6ec14aae14d708fd7d4c93ea8390f875771485350e0af82eaf01b57db0dc2ba3bf94fe63e0404c0796a81a87dc6aabb768dee35ebd06054ac89ea3de3fbe0eae2b3c3ddd621c410a3e8bffc07e676bba1ba83b9e6a2140dcb167bb8282f51f9606c90c361729f7b237674a6d7dc2e468e76bc482d3f8feed2cd49abb1c4cb54e5b8b3e5addccab591e063016b7467fe29448bb1b00d2663a90db7e2112723b36fdec3c2fd54968243a4aae543e2610812791907789bbe3dfac9d89e4d8cdd61afcf6b09db1fad1e8bed74e8c3fb8cda0078d2d9c0ceb7c05928ad240ba0ebcfbafb8eaca3d29e7dd1efb91e5173799a65f286b9b310e169506d562b6d87a32d09f1c3050f7149a463985450512f601aa4b0788c6c004df43dd88455f8622e623e9db71e11aa48eed5deda72bfee17c3f95136a471fe1344b125f2b61b4e3262f3ee3c157934edfd946244fa33e8f338a6c2b8a4c48a4b7124974f0ec37df7d9e8125cf32578775b2c3088d7f940ae278cc8b38fc079d3f9213eb6e8898a7b884fa9bf9c3685b57e261088551f8db4f3fb5fd8061b1f0b529f98389f6020016433f5d7dad48372d66ca50f30b7751dea550722a19b76d00c35d1c617c6507fed4190ecff91e295296272a36cb5c806f49a75a14df0aab8c0baf1e24d9c120f217546e6000d5b861aa564f577ece3fd54c9fb40c5952ee3fcc80e14105cd1dc417d5961acc75224877f46c3e0cbeeec71969fe46cc170a36aa435b23205bbcd2b620d92dce62f100f708f1df436bc994fdc77e165157bd0cd8c65c3f2c41219086b5319b8ee862a7c5c2947c35cfcef97f5462143a9edabec98ab79fb12d13cda14cb7da9f2350a1345fdd5f737c2f54f5b3075bde3d50b524b378863d5cbfaea10ccbee183d54a4d63a2e734af2435f2163def9b6ca6ea61f8104e6c510078a7a7cf2dae37df3faf4b4f944075e6dba32ec7afce8ce8914dece85d3760197e8e56f5ca94243af1f372aa789df3f496fe540dd90a2f21c167f6ac2e5521711cfcad5e6b4f2abb505ab11df35db1f400386600f8961d23bf3f286d47169f00975d239dce4e2a3ba127a162f357f2cdd9feca8660da4885802f4147e5017da9409c410199bf8c6e8f2f48292e763d8295cda434e753ab9dff69382db32995227c444b5b149537a3e9b2bd358425763dbc7efae21cdcd9dfef8ad9b244a55af019f999b84b20b4e3821f74ed0bdb2a72fbe18a9d47d9aa303937fbda43de59563523dd024e87682cb3d13125ba3851ed9fe43b577120efa71a0b7366590272e19739d0425358d05a947ec44d0a824544391f7a6073e238735064469a4e57be6dc0c3c58bbad536f443bd7e75c056780e30fb470a859b1df8341332398302286f8ce698139a1f9fe49ff7887f013de2e665184c8564866e361deff2e9bd637db368442e4ddbdd29800a2bd4379dfe8bbceafc64563f69c4fa47e709678ac9a862ab2b8fb77602ccddaef2a1f4b49ad974adeb01f24f8a6a453f3a113a66ca883cb40b148a34e4bf31b894de2da5900d9277464f9c20b9b42ba0a1b0c145d107428f29d85c9ed43efe575ed19da310943771b0897e151c91584e3645372f1186e7ae5def2d7a3e08ba4fb9c709de8a8ae2a601abbe6753f338fa404705187e5a6ae60b4755006fa71a137624cb29b5ff52898c800185fd467c373d2a4e382d63822e5deae80a66273286a6522c81761aa3bd1c044b39aeaa32568ef506d9961272f851c7f5fc1960684597c6296e32266e61931477bf06b68a469807c6db623e5b9e1cd76a339c659dd5593f872a234a5966970bde0c58c5baddf714316efe07fa4b31e23eea6394b6fdba8181f57ebe4f510f2958b1a5248e4595aec049d61bf6614b397d317a45caaff058149828be98751a1c1d2052186e70e0f21544349094ff9ad40dda4ae565534214a41938aed13159b04936d759bf1da8a6c6af10b9e4c3c2c2233da18b2077966f73ad5ca41cb54292d68115cbf82377e77a2373acf736f16cb043af07ecebb785cb2a8ebc16d9d0fd6421da3f96a4fd38697084b6195c1334db323ae0d88bbc1a361962905f63b8eb32c1a4a6607a7270a5fadadc4fd78a2e52d2a1db6e1387b4af4f2b73b26723a93926ebb07a63c90e2f2be123bd9831d567d09f515af91ae5124910b6777b087d4b5c6c0fb6022be37ddee8910b1d3c12c6a3434d09685c6cd487e70c48f5824c77ca086bc8da3ff414842dee3b25e912c3785189c475ce14b00e2ccc710ebdd09df3afa053aa92ea057815dc26dc9367e7ea49d2129a55188013cff17b9153f11367af452d4c6cb99f6dc1ab4a0cb101264bf3b508b1bf9d5b61789567cfd5b501bd97f6ba5a98d0d63e35895827c9dcd7cb3057748cf1a58d1a2106144d768d8d6a07dab88e9c78cbac21d14b30b23d8c3860d896f5768adb7a04bc27d9d59159e7d3933f1ed0e34947904a3ebd52e65", 0x1000}, {&(0x7f00000000c0)="ee61a418c5f3085bd8251734885b6c5dad5ae5a8cdd1d999669bdae78b998ddf5d3e0888437d52b43bd3a18435b65170b988823592d3faca2e4d555f087a183ae965c644864f3f98c4e2721775c654d7593985d53466aaa59f49abd8838812a60a150a0595256aa8c4fce4a60c1da2edbd05c8d84e0124c885a9dd628042a594d85bcea1a0438c26f42bde8717440aff4b009ae86878e2bca3cbd7382db76fc6642e7ddeebf0", 0xa6}, {&(0x7f0000000180)="c592619c2cb6081faae508fe7217d7", 0xf}, {&(0x7f00000001c0)="952f68bf35296aab2bd78feecde0e7233e6fd29d3aec8658f16e9c1aac605bf118467c85f7d2e0a934092044b03029", 0x2f}], 0x4}, 0x840) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="1f000000120081c3293869a8f14e058007000000000000000000000000002f", 0x1f}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 10:59:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:59:27 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086607, &(0x7f0000000000)) 10:59:27 executing program 0: perf_event_open$cgroup(&(0x7f0000000740)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x282b8703, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.943168][ T8416] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:59:27 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40305839, 0x532006) write$cgroup_int(r0, 0x0, 0x0) 10:59:27 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086607, &(0x7f0000000000)) 10:59:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10b8}, 0x0) close(r0) 10:59:27 executing program 1: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8910, &(0x7f0000000040)='ip%[\\r\x85H\'\xdd5K6gre0\x00') 10:59:27 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 10:59:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10b8}, 0x0) close(r0) 10:59:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETSTEERINGEBPF(r0, 0x400454d1, 0x0) 10:59:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000002c0)=r0, 0x4) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) 10:59:27 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001000)=""/4096, 0x1000}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)="8a", 0x1}], 0x1}, 0x0) [ 257.353236][ T8444] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:59:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) socket$kcm(0x2, 0x0, 0x2) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 10:59:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0x12) write$cgroup_int(r0, &(0x7f0000000080)=0x2000000000000000, 0x20000092) 10:59:28 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x43) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x20248800) 10:59:28 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001000)=""/4096, 0x1000}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)="8a", 0x1}], 0x1}, 0x0) 10:59:28 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000840)="497a287c9bfaf3351bcd2fc76db2d075ea2f9a8ebf803bf85dc2249781573df7f0ee3911417b78012ec660bef00dc2362a262b54da098df2b17555940bc9ccbd09e4c2ca035d2a06409a8a063d139ee41fc71ffb3211149c35f0", 0x5a}], 0x1, 0x0, 0x0, 0x20000000}, 0x20008005) 10:59:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000240), 0xfffffffffffffd66) 10:59:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000000)=@nl=@proc={0x10, 0x0, 0x25dfdbfc}, 0x80, 0x0}, 0x0) [ 257.959539][ T8480] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:59:28 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'syzkaller0\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'bond_slave_1\x00'}) 10:59:28 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:28 executing program 1: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8980, &(0x7f0000000000)='ip6gre0\x00') 10:59:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x100, 0x8, 0x1fe}, 0x40) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) [ 258.230423][ T8467] syz-executor.4 (8467) used greatest stack depth: 23416 bytes left 10:59:28 executing program 4: socketpair(0x2e3580e066a1175f, 0x0, 0x0, &(0x7f0000000000)) [ 258.431341][ T8506] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:59:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002540)={&(0x7f0000002300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2, 0x10001}]}]}}, &(0x7f0000002480)=""/156, 0x32, 0x9c, 0x1}, 0x20) 10:59:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 10:59:29 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 10:59:29 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) 10:59:29 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f000000bc40)={0x0, 0x0, 0x0}, 0x0) 10:59:29 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x21, 0x2, 0x2) close(r0) 10:59:29 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000080)=[{&(0x7f0000002140)="b51b43b6fbf977f93646317cea4b944020faec2e6692eacb76a18fc37203c0da5e950060718dcb8d4b21dc17d3d305e495519568cf", 0x35}], 0x1, &(0x7f0000000380)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x26}, @dev}}}], 0x20}, 0x8000) close(r0) 10:59:29 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) 10:59:29 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={@cgroup, 0xffffffffffffffff, 0x11}, 0x10) 10:59:29 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) [ 258.852107][ T8529] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 258.920137][ T8529] EXT4-fs (loop2): re-mounted. Opts: 10:59:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0xfffffffe, &(0x7f00000000c0)=[{&(0x7f0000000200)="2e00000014008501040058656000002e0a0a00e22c000000160001808eb3d81fc77948f328995a017c7b58510600", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 10:59:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x23, 0x4, 0x1, 0x0, r0}, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r1, &(0x7f0000000000), 0x0}, 0x20) 10:59:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000002000055bd25a80648c63940d0524fc60100021400a0002000200000037153e370a000580c4080000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000002900)={0x0, 0x0, 0x0}, 0x0) 10:59:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001000)=""/4096, 0x1000}], 0x1}, 0x0) 10:59:29 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) 10:59:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:29 executing program 4: socketpair(0x29, 0x5, 0x1, &(0x7f00000003c0)={0x0, 0x0}) 10:59:29 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) 10:59:29 executing program 5: bpf$BPF_PROG_QUERY(0x22, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 10:59:29 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_devices(r1, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0xfffffdef) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) bpf$MAP_CREATE(0x0, &(0x7f0000017740)={0x9, 0x7, 0xca84, 0x7, 0x418, 0xffffffffffffffff, 0x1f, [], 0x0, r0, 0x1, 0x1, 0x5}, 0x40) [ 259.242222][ T8561] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:59:30 executing program 4: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{0x0}, {&(0x7f00000000c0)}], 0x2}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="1f000000120081c3293869a8f14e058007000000000000000000000000002f", 0x1f}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 10:59:30 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) [ 259.380735][ T8561] EXT4-fs (loop2): re-mounted. Opts: 10:59:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:30 executing program 5: socketpair(0x1, 0x100000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8980, &(0x7f0000000040)='lo:&\xb7`Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 10:59:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)={[{0x0, 'memory'}, {0x0, 'cpu'}, {0x2d, 'cpu'}, {0x0, 'memory'}]}, 0x1a) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) [ 259.666433][ T8589] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 259.748977][ T8589] EXT4-fs (loop2): re-mounted. Opts: 10:59:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x22, &(0x7f00000002c0), 0x4) 10:59:30 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) 10:59:30 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e1, &(0x7f0000000300)) 10:59:30 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)) 10:59:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)={[{0x0, 'memory'}, {0x0, 'cpu'}, {0x2d, 'cpu'}, {0x0, 'memory'}]}, 0x1a) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) [ 260.093634][ T8603] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 10:59:30 executing program 5: socketpair(0x29, 0x2, 0x0, &(0x7f0000000000)) 10:59:30 executing program 2: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, 0xffffffffffffffff, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 260.210988][ T8603] EXT4-fs (loop2): re-mounted. Opts: 10:59:30 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e1, &(0x7f0000000300)) 10:59:30 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) 10:59:30 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000001540)={r1, 0x0, 0x0}, 0x10) 10:59:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xb, 0x6, 0x209e20, 0x2, 0x1}, 0x40) perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000440)=""/130}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f00000000c0), &(0x7f0000000340)=""/203}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x1) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000000440)=""/130}, 0x20) 10:59:31 executing program 0: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x2, &(0x7f0000000000)='ip6gre0\x00') 10:59:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="d000000000000000a40f0a41fb0b0000ac7da9a17b1cc8b7c5e843c4d2b784ba20e18010ba8c188a93d9a7a26909f4c6f04e9b2fc028f85dbf040e42902cd4ef070690fc8adc6b9c5f84f59e65bd03132f30ffcb4656d7a65d561fbd30ac38d77098e0b9330557dac6af773cf0c2c294f7b1faa851b5e3a4dfabe4b8c4dfeb6d6eb6f5fcd6ef15bf32a515d15a7f65f3efc4f5625447423310cbcb3f6c8a0e10f96f1ae429c3d235aaa45e6077d6c10f0459ae9d6638809e4330998147f089371383ff1cc6cc2f66b21200000000000028"], 0xf8}, 0x1) 10:59:31 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) 10:59:31 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x4d, 0x0, 0x300) 10:59:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400c00) write$cgroup_int(r0, &(0x7f0000000000), 0xffffffbd) 10:59:31 executing program 2: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, 0xffffffffffffffff, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x0, 0x0) 10:59:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffffbd) 10:59:31 executing program 3: r0 = socket$kcm(0xa, 0x0, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) 10:59:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xa, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 10:59:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086607, &(0x7f00000005c0)=0x400080000) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r1, &(0x7f0000000240)="dc1c6d1163f0699fa67a4296c5ee365b90f59ba2f6d21aaec0e798ebc9df7bfbce1e2e8e4986b9429e96f5ef88940675ec674bf95e7f4564edbf3ae514745991e539d967dcc52157dd097f2f3894249cbe4f840829f46a58da7a4fc01464051f84cb976af602f5faf150d22fa18d073601db407a4e12e2bf75685b01d38e3e1724dc2ef59f29f8dee424dd40f3a1748ce99fa5eb3f2fdfc772edabe9cf96dd6f5afc0fbc184f434c11d80b5db6c2190f9adba7668391a568ca3a77661d608d04dff5e89eeb71deba565dd61bb48ccd716aa933815d", &(0x7f0000000000)=""/140, 0x4}, 0x20) socket$kcm(0x2, 0x0, 0x2) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, 0x0, 0x0) recvmsg(r2, 0x0, 0x0) 10:59:31 executing program 2: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, 0xffffffffffffffff, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:31 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x24004019) sendmsg$sock(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000240)="c0", 0x1}], 0x1, &(0x7f0000001700)=[@timestamping={{0x14, 0x1, 0x25, 0x2}}], 0x18}, 0x0) 10:59:31 executing program 3: socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) 10:59:32 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000180)='w', 0x1}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 10:59:32 executing program 3: socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) 10:59:32 executing program 0: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)}, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)="c00e7b", 0x3}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') 10:59:32 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x101, 0x8, 0x1ff}, 0x40) bpf$MAP_LOOKUP_BATCH(0x1a, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x1f, r0}, 0x38) 10:59:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000040)='GPL\x00', 0x7, 0x97, &(0x7f0000000080)=""/151, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 10:59:32 executing program 3: socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) 10:59:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xa, 0x4, 0x6d, 0x8000000000000002, 0x0, 0x0}, 0x40) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x18, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 10:59:32 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, 0x0, 0x0) 10:59:32 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f00000021c0)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x23, 0x4, 0x1, 0x0, r0}, 0x40) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, &(0x7f00000010c0), &(0x7f00000021c0)=""/4106}, 0x20) 10:59:32 executing program 5: socketpair(0x1, 0x100000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8910, &(0x7f0000000040)='lo:&\xb7`Q\xb1Y\xa9\xc8J,`\xd2\x98\x02\x00\x00 ') 10:59:32 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, 0x0, 0x0) 10:59:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:59:32 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x20043608) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 10:59:33 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, 0x0, 0x0) 10:59:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4f9debbb2c6fbdee}, 0x40) 10:59:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x23, &(0x7f00000002c0), 0x4) 10:59:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1000000, r0}, 0x38) 10:59:33 executing program 1: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000300)=r0) 10:59:33 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 10:59:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) 10:59:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040000002b24ec10064b6fb14bccedfb718aef932f38ddcdcdc362f6a689d1fdda5b9134015a860f5878c37ffe36e1165d14d435be5b317c6c8189767d2f97879f07a715bb7c169f46933d9338f4ab0483696f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d7000000101061dc494749257bd3782da7fbc80465d81ca2c1089783a27dc3c8e40ac943c7465ea6d0917db458a98bae6f19ebebed205e240c46a7892ba915a0f2fc9d26b972f2bf05a6bedfd26344ac78b5eb28c2bb41e08e04a593e7e0f2384ff7a188b9858a92d8e43e5242267c7b2a2cd2bdfb8315c00bff0fba611eaa3a36fb7afe9a139765a4c3dc4a62875c005bb2eac000f4110cd877df0e1ef2da886f89f40a03d719e2dd0151"], 0x10b8}, 0x0) close(r0) 10:59:33 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000001140), 0x12) write$cgroup_int(r0, &(0x7f0000000000), 0xffffffbd) 10:59:33 executing program 4: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000080)=[{&(0x7f00000001c0), 0xf401}, {&(0x7f0000002140)="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", 0x113}], 0x2, &(0x7f0000000380)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x26}, @dev}}}], 0x20}, 0x0) 10:59:33 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:33 executing program 1: bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x10) 10:59:33 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 10:59:33 executing program 0: r0 = socket$kcm(0x10, 0x10000000000003, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="2e00000018008108e00f80ecdb4cb92e0a00072c000cd310e8bd6efb1200697ba00cba82bd81c933de71da06000e", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 10:59:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x4, 0x200000004, 0x8, 0x44, 0x1}, 0x40) 10:59:33 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 10:59:33 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'macsec0\x00'}) 10:59:33 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x4}, 0x40) 10:59:33 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x400c00) write$cgroup_int(r0, &(0x7f0000000100), 0x12) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 10:59:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018100010", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:59:34 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) 10:59:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x0, 0x2) 10:59:34 executing program 3: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000040)) 10:59:34 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) 10:59:34 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 10:59:34 executing program 1: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000200)="752c77f2fc8591b582d9c9bf93aa6f378b", 0x11}, {&(0x7f0000000240)="1005ea21", 0x4}], 0x2, 0x0, 0x68}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000000)='ip6gre0\x00') 10:59:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="48000000150081fb7059ae08030c0400021100b9eb1b87014e230000dbd78fc0adbd7c493872f750371ed08a562ad692c3170f787a0346a25ac6bfe74703c48f93b82afbff000046", 0x48}], 0x1}, 0x0) 10:59:34 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:34 executing program 4: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)}, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000240), 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') 10:59:34 executing program 1: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)}, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000240)="c00e7b", 0x3}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000000)='ip6gre0\x00') 10:59:34 executing program 3: socketpair(0x1, 0x100000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000040)='lo:&\xb7`Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') 10:59:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, &(0x7f00000005c0)=0x400080000) socket$kcm(0x2, 0x0, 0x2) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 10:59:35 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:35 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x6f, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x4, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYRES16], 0x6) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) 10:59:35 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000080)=[{&(0x7f00000001c0), 0xe803}, {&(0x7f0000002140)="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", 0x113}], 0x2, &(0x7f0000000380)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x26}, @dev}}}], 0x20}, 0x0) 10:59:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) bpf$MAP_LOOKUP_BATCH(0x1a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 10:59:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 264.579613][ T8832] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) 10:59:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1000000, r0}, 0x38) 10:59:35 executing program 0: perf_event_open(&(0x7f00000019c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:59:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 10:59:35 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000017cc0)={0xc, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 10:59:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x6) 10:59:35 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000180)="b8f42698da8fe5ba96", 0x9}], 0x1, 0x0, 0xf8}, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x127) 10:59:35 executing program 0: socketpair(0x1, 0x100000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89b0, &(0x7f0000000040)='lo:&\xb7`Q\xb1Y\xa9\xc8J,`\xd2\x98\x00\x00\x00 ') [ 264.993407][ T8859] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) 10:59:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x10, 0x4, 0x4, 0xffff, 0x2}, 0x40) 10:59:35 executing program 5: socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') 10:59:35 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/net\x00') 10:59:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB], 0x10b8}, 0x0) close(r0) 10:59:35 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:35 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 10:59:35 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="540000000806150400009b0000000000000000000d00030068617300436e65740a00000005000400014000000900020073797a30000092000c0007800800122b8081000405000d000200f1000500010006"], 0x54}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 10:59:35 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/sem\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) r2 = dup2(r1, r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000002b8, 0x0) 10:59:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x200, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x2bcf) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) sendto$inet(r0, &(0x7f0000000000)="eb793b", 0x3, 0x1, 0x0, 0x0) [ 265.448255][ T8886] EXT4-fs (loop2): bad geometry: block count 512 exceeds size of device (96 blocks) 10:59:36 executing program 3: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x15b3}) 10:59:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200187ec, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x200092c4}], 0x1, 0x0, 0x57b7}, 0x100) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRESOCT, @ANYRESDEC], 0x1000001bd) [ 265.607893][ T8897] x_tables: duplicate underflow at hook 2 10:59:36 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:36 executing program 1: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) 10:59:36 executing program 3: [ 265.828396][ T8906] blktrace: Concurrent blktraces are not allowed on loop0 10:59:36 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:36 executing program 3: 10:59:36 executing program 1: 10:59:36 executing program 3: [ 266.313770][ T8897] x_tables: duplicate underflow at hook 2 10:59:37 executing program 4: 10:59:37 executing program 5: 10:59:37 executing program 1: 10:59:37 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:37 executing program 3: 10:59:37 executing program 4: 10:59:37 executing program 0: 10:59:37 executing program 3: 10:59:37 executing program 1: 10:59:37 executing program 0: 10:59:37 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:37 executing program 4: 10:59:37 executing program 5: 10:59:37 executing program 1: 10:59:37 executing program 0: 10:59:37 executing program 3: 10:59:37 executing program 4: [ 267.175403][ T8942] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 267.194758][ T8942] EXT4-fs (loop2): mount failed 10:59:37 executing program 5: 10:59:37 executing program 0: 10:59:37 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:37 executing program 3: 10:59:37 executing program 1: 10:59:38 executing program 4: 10:59:38 executing program 5: 10:59:38 executing program 3: 10:59:38 executing program 0: 10:59:38 executing program 1: 10:59:38 executing program 5: 10:59:38 executing program 4: 10:59:38 executing program 1: [ 267.718089][ T8960] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 10:59:38 executing program 1: [ 267.833324][ T8960] EXT4-fs (loop2): mount failed 10:59:38 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:38 executing program 1: 10:59:38 executing program 0: 10:59:38 executing program 3: 10:59:38 executing program 5: 10:59:38 executing program 4: 10:59:38 executing program 5: 10:59:38 executing program 0: 10:59:38 executing program 1: 10:59:38 executing program 3: 10:59:38 executing program 4: 10:59:38 executing program 5: [ 268.196030][ T8980] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 268.297083][ T8980] EXT4-fs (loop2): mount failed 10:59:39 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:39 executing program 4: 10:59:39 executing program 1: 10:59:39 executing program 0: 10:59:39 executing program 3: 10:59:39 executing program 5: 10:59:39 executing program 4: 10:59:39 executing program 1: 10:59:39 executing program 0: 10:59:39 executing program 3: 10:59:39 executing program 5: 10:59:39 executing program 1: [ 268.622081][ T8999] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 268.673198][ T8999] EXT4-fs (loop2): mount failed 10:59:39 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:39 executing program 4: 10:59:39 executing program 0: 10:59:39 executing program 3: 10:59:39 executing program 5: 10:59:39 executing program 1: 10:59:39 executing program 4: 10:59:39 executing program 3: 10:59:39 executing program 5: 10:59:39 executing program 1: 10:59:39 executing program 0: 10:59:39 executing program 5: [ 269.006713][ T9017] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 269.132418][ T9017] EXT4-fs (loop2): mount failed 10:59:39 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:39 executing program 4: 10:59:39 executing program 0: 10:59:39 executing program 1: 10:59:39 executing program 3: 10:59:39 executing program 5: 10:59:39 executing program 4: 10:59:39 executing program 0: 10:59:40 executing program 1: 10:59:40 executing program 3: 10:59:40 executing program 5: 10:59:40 executing program 0: [ 269.466991][ T9036] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 269.529647][ T9036] EXT4-fs (loop2): mount failed 10:59:40 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:40 executing program 3: 10:59:40 executing program 0: 10:59:40 executing program 1: 10:59:40 executing program 4: 10:59:40 executing program 5: 10:59:40 executing program 3: 10:59:40 executing program 0: 10:59:40 executing program 1: 10:59:40 executing program 4: 10:59:40 executing program 5: 10:59:40 executing program 0: [ 269.945119][ T9056] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 270.092663][ T9056] EXT4-fs (loop2): mount failed 10:59:40 executing program 3: 10:59:40 executing program 5: 10:59:40 executing program 0: 10:59:40 executing program 1: 10:59:40 executing program 4: 10:59:40 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:40 executing program 0: 10:59:40 executing program 3: 10:59:40 executing program 4: 10:59:40 executing program 1: 10:59:40 executing program 5: 10:59:41 executing program 0: [ 270.428219][ T9073] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 270.503914][ T9073] EXT4-fs (loop2): mount failed 10:59:41 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900), 0x0, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:41 executing program 5: 10:59:41 executing program 1: 10:59:41 executing program 3: 10:59:41 executing program 4: 10:59:41 executing program 0: 10:59:41 executing program 3: 10:59:41 executing program 5: 10:59:41 executing program 1: 10:59:41 executing program 4: 10:59:41 executing program 0: [ 270.836620][ T9091] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 10:59:41 executing program 3: [ 270.881201][ T9091] EXT4-fs (loop2): mount failed 10:59:41 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0", 0x3, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:41 executing program 5: 10:59:41 executing program 1: 10:59:41 executing program 3: 10:59:41 executing program 4: 10:59:41 executing program 0: 10:59:41 executing program 3: 10:59:41 executing program 5: 10:59:41 executing program 1: 10:59:41 executing program 4: 10:59:41 executing program 0: [ 271.232909][ T9109] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 10:59:41 executing program 5: [ 271.370570][ T9109] EXT4-fs (loop2): mount failed 10:59:42 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0", 0x3, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:42 executing program 0: 10:59:42 executing program 3: 10:59:42 executing program 4: 10:59:42 executing program 1: 10:59:42 executing program 5: 10:59:42 executing program 3: 10:59:42 executing program 4: 10:59:42 executing program 0: 10:59:42 executing program 1: 10:59:42 executing program 3: [ 271.762161][ T9130] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 10:59:42 executing program 5: [ 271.805315][ T9130] EXT4-fs (loop2): mount failed 10:59:42 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0", 0x3, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:42 executing program 4: 10:59:42 executing program 0: 10:59:42 executing program 1: 10:59:42 executing program 3: 10:59:42 executing program 1: 10:59:42 executing program 4: 10:59:42 executing program 5: 10:59:42 executing program 0: 10:59:42 executing program 3: 10:59:42 executing program 1: [ 272.203624][ T9148] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 272.223237][ T9148] EXT4-fs (loop2): mount failed 10:59:42 executing program 4: 10:59:43 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d9", 0x4, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:43 executing program 1: 10:59:43 executing program 5: 10:59:43 executing program 3: 10:59:43 executing program 0: 10:59:43 executing program 4: 10:59:43 executing program 1: 10:59:43 executing program 5: 10:59:43 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0", 0x3, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:43 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {0x0, 0x0, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:43 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:43 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 272.713875][ T9167] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 272.808814][ T9173] EXT4-fs warning (device loop5): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 272.855212][ T9167] EXT4-fs (loop2): mount failed [ 272.897801][ T9176] EXT4-fs warning (device loop3): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 272.988449][ T9183] EXT4-fs warning (device loop1): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 273.004800][ T9173] EXT4-fs (loop5): mount failed [ 273.005516][ T9183] EXT4-fs (loop1): mount failed [ 273.050313][ T9176] EXT4-fs (loop3): mount failed 10:59:43 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d9", 0x4, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:43 executing program 0: r0 = syz_mount_image$ext4(0x0, &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:43 executing program 1: mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, 0xffffffffffffffff, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 273.294596][ T9187] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (96 blocks) 10:59:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:44 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 273.523298][ T9205] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 273.526372][ T9202] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 273.613844][ T9205] EXT4-fs (loop2): mount failed 10:59:44 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) [ 273.812463][ T9218] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 273.845275][ T9217] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 273.863755][ T9223] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 10:59:44 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d9", 0x4, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 273.925178][ T9235] FAULT_INJECTION: forcing a failure. [ 273.925178][ T9235] name fail_usercopy, interval 1, probability 0, space 0, times 1 10:59:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 273.997869][ T9235] CPU: 1 PID: 9235 Comm: syz-executor.1 Not tainted 5.9.0-rc6-next-20200924-syzkaller #0 [ 274.007724][ T9235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.017855][ T9235] Call Trace: [ 274.021227][ T9235] dump_stack+0x198/0x1fb [ 274.025586][ T9235] should_fail.cold+0x5/0xa [ 274.030207][ T9235] _copy_from_user+0x2c/0x180 [ 274.034949][ T9235] __copy_msghdr_from_user+0x91/0x4b0 [ 274.040338][ T9235] ? __ia32_sys_shutdown+0x70/0x70 [ 274.045606][ T9235] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 274.051608][ T9235] ? __lock_acquire+0xbb9/0x56d0 [ 274.056588][ T9235] sendmsg_copy_msghdr+0xa1/0x160 [ 274.061645][ T9235] ? do_recvmmsg+0x700/0x700 [ 274.066257][ T9235] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 274.072246][ T9235] ? _parse_integer+0x132/0x180 [ 274.077091][ T9235] ___sys_sendmsg+0xc6/0x170 [ 274.081670][ T9235] ? sendmsg_copy_msghdr+0x160/0x160 [ 274.086948][ T9235] ? lock_downgrade+0x830/0x830 [ 274.091816][ T9235] ? lock_is_held_type+0xbb/0xf0 [ 274.096739][ T9235] ? find_held_lock+0x2d/0x110 [ 274.101555][ T9235] ? ksys_write+0x212/0x250 [ 274.106087][ T9235] ? __fget_files+0x294/0x400 [ 274.110753][ T9235] ? __fget_light+0xea/0x280 [ 274.115331][ T9235] __sys_sendmsg+0xe5/0x1b0 [ 274.119819][ T9235] ? __sys_sendmsg_sock+0xb0/0xb0 [ 274.124828][ T9235] ? fput_many+0x2f/0x1a0 [ 274.129140][ T9235] ? ksys_write+0x1a5/0x250 [ 274.133627][ T9235] ? lock_is_held_type+0xbb/0xf0 [ 274.138552][ T9235] ? check_preemption_disabled+0x50/0x130 [ 274.144257][ T9235] ? syscall_enter_from_user_mode+0x1d/0x60 [ 274.150233][ T9235] do_syscall_64+0x2d/0x70 [ 274.154669][ T9235] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 274.160544][ T9235] RIP: 0033:0x45e179 [ 274.164425][ T9235] Code: 3d b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.184009][ T9235] RSP: 002b:00007f4058733c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:59:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 274.192424][ T9235] RAX: ffffffffffffffda RBX: 000000000002d200 RCX: 000000000045e179 [ 274.200378][ T9235] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000000000003 [ 274.208330][ T9235] RBP: 00007f4058733ca0 R08: 0000000000000000 R09: 0000000000000000 [ 274.216295][ T9235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 274.224249][ T9235] R13: 00007ffda7a0ec7f R14: 00007f40587349c0 R15: 000000000118cf4c 10:59:44 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 274.331433][ T9238] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 274.357519][ T9245] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 274.388652][ T9238] EXT4-fs (loop2): mount failed [ 274.471448][ T9245] EXT4-fs (loop3): re-mounted. Opts: 10:59:45 executing program 1 (fault-call:1 fault-nth:1): r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) 10:59:45 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 274.640935][ T9250] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 274.733734][ T9260] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 10:59:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 274.780045][ T9267] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 274.795929][ T9258] EXT4-fs (loop4): re-mounted. Opts: [ 274.797107][ T9267] EXT4-fs (loop2): mount failed 10:59:45 executing program 0: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 274.904667][ T9271] FAULT_INJECTION: forcing a failure. [ 274.904667][ T9271] name fail_usercopy, interval 1, probability 0, space 0, times 0 10:59:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:45 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 274.960008][ T9271] CPU: 1 PID: 9271 Comm: syz-executor.1 Not tainted 5.9.0-rc6-next-20200924-syzkaller #0 [ 274.969862][ T9271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.979961][ T9271] Call Trace: [ 274.983276][ T9271] dump_stack+0x198/0x1fb [ 274.987622][ T9271] should_fail.cold+0x5/0xa [ 274.992146][ T9271] _copy_from_user+0x2c/0x180 [ 274.996844][ T9271] move_addr_to_kernel.part.0+0x31/0x110 [ 275.002497][ T9271] __copy_msghdr_from_user+0x3da/0x4b0 10:59:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 275.007971][ T9271] ? __ia32_sys_shutdown+0x70/0x70 [ 275.013114][ T9271] ? __lock_acquire+0xbb9/0x56d0 [ 275.018071][ T9271] sendmsg_copy_msghdr+0xa1/0x160 [ 275.023109][ T9271] ? do_recvmmsg+0x700/0x700 [ 275.027748][ T9271] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 275.033741][ T9271] ? _parse_integer+0x132/0x180 [ 275.038593][ T9271] ___sys_sendmsg+0xc6/0x170 [ 275.043209][ T9271] ? sendmsg_copy_msghdr+0x160/0x160 [ 275.048483][ T9271] ? lock_downgrade+0x830/0x830 [ 275.053329][ T9271] ? lock_is_held_type+0xbb/0xf0 [ 275.058250][ T9271] ? find_held_lock+0x2d/0x110 [ 275.063009][ T9271] ? ksys_write+0x212/0x250 [ 275.067500][ T9271] ? __fget_files+0x294/0x400 [ 275.072163][ T9271] ? __fget_light+0xea/0x280 [ 275.076739][ T9271] __sys_sendmsg+0xe5/0x1b0 [ 275.081244][ T9271] ? __sys_sendmsg_sock+0xb0/0xb0 [ 275.086267][ T9271] ? fput_many+0x2f/0x1a0 [ 275.090597][ T9271] ? ksys_write+0x1a5/0x250 [ 275.095120][ T9271] ? check_preemption_disabled+0x50/0x130 [ 275.100848][ T9271] ? syscall_enter_from_user_mode+0x1d/0x60 [ 275.106764][ T9271] do_syscall_64+0x2d/0x70 [ 275.111184][ T9271] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 275.117058][ T9271] RIP: 0033:0x45e179 [ 275.120938][ T9271] Code: 3d b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.140538][ T9271] RSP: 002b:00007f4058733c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 275.148946][ T9271] RAX: ffffffffffffffda RBX: 000000000002d200 RCX: 000000000045e179 10:59:45 executing program 1 (fault-call:1 fault-nth:2): r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) [ 275.156902][ T9271] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000000000003 [ 275.164954][ T9271] RBP: 00007f4058733ca0 R08: 0000000000000000 R09: 0000000000000000 [ 275.172917][ T9271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 275.180886][ T9271] R13: 00007ffda7a0ec7f R14: 00007f40587349c0 R15: 000000000118cf4c [ 275.387368][ T9284] FAULT_INJECTION: forcing a failure. [ 275.387368][ T9284] name failslab, interval 1, probability 0, space 0, times 1 [ 275.403183][ T9284] CPU: 0 PID: 9284 Comm: syz-executor.1 Not tainted 5.9.0-rc6-next-20200924-syzkaller #0 [ 275.413013][ T9284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.423083][ T9284] Call Trace: [ 275.426393][ T9284] dump_stack+0x198/0x1fb [ 275.430743][ T9284] should_fail.cold+0x5/0xa [ 275.435327][ T9284] should_failslab+0x5/0x10 [ 275.439926][ T9284] kmem_cache_alloc_node+0x3a1/0x580 [ 275.445228][ T9284] ? mark_lock+0xf7/0x2420 [ 275.449709][ T9284] __alloc_skb+0x71/0x550 [ 275.454057][ T9284] alloc_skb_with_frags+0x92/0x570 [ 275.459192][ T9284] ? mark_lock+0xf7/0x2420 [ 275.463624][ T9284] sock_alloc_send_pskb+0x72a/0x880 [ 275.468845][ T9284] ? sock_wmalloc+0x120/0x120 [ 275.473614][ T9284] ? ip6_dst_lookup_tail+0x8bd/0x1700 [ 275.479011][ T9284] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 275.485025][ T9284] __ip6_append_data.isra.0+0x1b7d/0x3890 [ 275.490838][ T9284] ? ip_frag_init+0x330/0x330 [ 275.495537][ T9284] ? ip6_finish_output2+0x1770/0x1770 [ 275.500983][ T9284] ? ip6_mtu+0x170/0x470 [ 275.505250][ T9284] ? ip6_setup_cork+0xfbc/0x1740 [ 275.510203][ T9284] ip6_append_data+0x1e7/0x330 [ 275.514978][ T9284] ? ip_frag_init+0x330/0x330 [ 275.519672][ T9284] ? ip_frag_init+0x330/0x330 [ 275.524434][ T9284] l2tp_ip6_sendmsg+0xbb9/0x19e0 [ 275.529391][ T9284] ? l2tp_ip6_recv+0xcb0/0xcb0 [ 275.534176][ T9284] ? lock_is_held_type+0xbb/0xf0 [ 275.539144][ T9284] ? __copy_msghdr_from_user+0x2b4/0x4b0 [ 275.544819][ T9284] inet_sendmsg+0x99/0xe0 [ 275.549168][ T9284] ? inet_send_prepare+0x4d0/0x4d0 [ 275.554293][ T9284] sock_sendmsg+0xcf/0x120 [ 275.558724][ T9284] ____sys_sendmsg+0x6e8/0x810 [ 275.563505][ T9284] ? kernel_sendmsg+0x50/0x50 [ 275.568186][ T9284] ? do_recvmmsg+0x700/0x700 [ 275.572774][ T9284] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 275.578748][ T9284] ? _parse_integer+0x132/0x180 [ 275.583596][ T9284] ___sys_sendmsg+0xf3/0x170 [ 275.588171][ T9284] ? sendmsg_copy_msghdr+0x160/0x160 [ 275.593454][ T9284] ? lock_downgrade+0x830/0x830 [ 275.598304][ T9284] ? lock_is_held_type+0xbb/0xf0 [ 275.603230][ T9284] ? find_held_lock+0x2d/0x110 [ 275.607985][ T9284] ? ksys_write+0x212/0x250 [ 275.612593][ T9284] ? __fget_files+0x294/0x400 [ 275.617259][ T9284] ? __fget_light+0xea/0x280 [ 275.621841][ T9284] __sys_sendmsg+0xe5/0x1b0 [ 275.626338][ T9284] ? __sys_sendmsg_sock+0xb0/0xb0 [ 275.631355][ T9284] ? check_preemption_disabled+0x50/0x130 [ 275.637077][ T9284] ? syscall_enter_from_user_mode+0x1d/0x60 [ 275.642992][ T9284] do_syscall_64+0x2d/0x70 [ 275.647409][ T9284] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 275.653301][ T9284] RIP: 0033:0x45e179 [ 275.657192][ T9284] Code: 3d b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.676780][ T9284] RSP: 002b:00007f4058733c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 275.685180][ T9284] RAX: ffffffffffffffda RBX: 000000000002d200 RCX: 000000000045e179 [ 275.693136][ T9284] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000000000003 [ 275.701089][ T9284] RBP: 00007f4058733ca0 R08: 0000000000000000 R09: 0000000000000000 [ 275.709045][ T9284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 275.717000][ T9284] R13: 00007ffda7a0ec7f R14: 00007f40587349c0 R15: 000000000118cf4c [ 275.744301][ T9291] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 275.764562][ T9281] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 275.804207][ T9282] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 275.849003][ T9295] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 275.898581][ T9282] EXT4-fs (loop2): mount failed 10:59:46 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:46 executing program 5: shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x4000) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x275a, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) fchown(r0, 0x0, r2) r3 = fcntl$getown(0xffffffffffffffff, 0x9) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x2, 0xffffffffffffffff, r2, 0xee00, 0xffffffffffffffff, 0x128, 0x100}, 0x7, 0x5, 0x7fff, 0x6, r3, 0x0, 0x4}) lchown(&(0x7f0000000000)='./file0\x00', 0x0, r2) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x610002, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) r6 = syz_open_pts(r5, 0x0) dup3(r6, r4, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x19) keyctl$get_keyring_id(0x0, 0x0, 0x9) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = eventfd2(0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) pselect6(0x40, &(0x7f0000000240)={0x0, 0x0, 0xc3}, 0x0, &(0x7f00000017c0)={0x1fe, 0x0, 0x0, 0x0, 0x5}, &(0x7f0000000200)={0x0, 0x989680}, 0x0) 10:59:46 executing program 1 (fault-call:1 fault-nth:3): r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) [ 276.211456][ T9283] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 10:59:47 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 276.363543][ T9321] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 276.383490][ T9320] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:59:47 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000001280)="88001c0000000000001c00080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03002200000000030000000000000000000000000100000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0120020000000000200000000000000000ed", 0x81, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000100)={0x5, 0x3, 0x40}) [ 276.430005][ T9330] FAULT_INJECTION: forcing a failure. [ 276.430005][ T9330] name failslab, interval 1, probability 0, space 0, times 0 [ 276.580712][ T9330] CPU: 1 PID: 9330 Comm: syz-executor.1 Not tainted 5.9.0-rc6-next-20200924-syzkaller #0 [ 276.590553][ T9330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.600627][ T9330] Call Trace: [ 276.603939][ T9330] dump_stack+0x198/0x1fb [ 276.608297][ T9330] should_fail.cold+0x5/0xa [ 276.612823][ T9330] should_failslab+0x5/0x10 [ 276.617351][ T9330] kmem_cache_alloc_node_trace+0x3c2/0x5b0 [ 276.623176][ T9330] ? rcu_read_lock_sched_held+0x3a/0xb0 [ 276.628742][ T9330] ? kmem_cache_alloc_node+0x469/0x580 [ 276.634227][ T9330] __kmalloc_node_track_caller+0x38/0x60 [ 276.639899][ T9330] __alloc_skb+0xae/0x550 [ 276.644259][ T9330] alloc_skb_with_frags+0x92/0x570 [ 276.649392][ T9330] ? mark_lock+0xf7/0x2420 [ 276.654010][ T9330] sock_alloc_send_pskb+0x72a/0x880 [ 276.659248][ T9330] ? sock_wmalloc+0x120/0x120 [ 276.663962][ T9330] ? ip6_dst_lookup_tail+0x8bd/0x1700 [ 276.669358][ T9330] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 276.675376][ T9330] __ip6_append_data.isra.0+0x1b7d/0x3890 [ 276.681130][ T9330] ? ip_frag_init+0x330/0x330 [ 276.685842][ T9330] ? ip6_finish_output2+0x1770/0x1770 [ 276.691239][ T9330] ? ip6_mtu+0x170/0x470 [ 276.695509][ T9330] ? ip6_setup_cork+0xfbc/0x1740 [ 276.700472][ T9330] ip6_append_data+0x1e7/0x330 [ 276.705269][ T9330] ? ip_frag_init+0x330/0x330 [ 276.709965][ T9330] ? ip_frag_init+0x330/0x330 [ 276.714670][ T9330] l2tp_ip6_sendmsg+0xbb9/0x19e0 [ 276.719648][ T9330] ? l2tp_ip6_recv+0xcb0/0xcb0 [ 276.724439][ T9330] ? lock_is_held_type+0xbb/0xf0 10:59:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="1f00000002031900000007000000e3800802bb0509000100010100", 0x1b}, {&(0x7f0000000300)="513abcbc", 0x4}], 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x3c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x20}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x94aa}]}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40080}, 0x0) r3 = socket$netlink(0x10, 0x3, 0xc) writev(r3, &(0x7f0000000200)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'sit0\x00'}) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280)=0x400, 0x4) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9, 0x400) fcntl$setsig(r4, 0xa, 0x1c) sendmsg$NFQNL_MSG_VERDICT(r4, &(0x7f00000007c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x420, 0x1, 0x3, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@NFQA_PAYLOAD={0x7e, 0xa, "21f502c058f496ff78010fc636131bd68518ae3f9e825bc352dd1ee6d632d54f8c209746f409437c2fa7ed7015d60739ac6fe8fedf5fed2129db2c3e100eb0e161cfcd5915f411479aa1a4848c588162f9d42bbab03b7c80ee6e3ebaa1c8175fbac7e1671de90ddc7fa4a1f0e08a6d2b1e734997ad597c25d4a5"}, @NFQA_CT={0xc, 0xb, 0x0, 0x1, [@CTA_MARK_MASK={0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x18aa8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6}]}, @NFQA_VLAN={0x2c, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x3}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}]}, @NFQA_PAYLOAD={0xad, 0xa, "7d2090d91f4f60e3a6da8d86442948241ffb11ff2efd84fda243f9cbf915ac879108a679c8a9d8dd784c6ec25d9b3cc4b3e5f2b4d65c868d45ee38fd711b31af4cb11552c57b5c58748f25aeeef877e22c7dec7bda47b0d44611c221bda46704af3fcb4806885954ad8da981fcd93004725d0ea0ce7c0ca3c24e406ab2c100a8f5333b96502e7b7f0d322ad5ab3ed9ef5fda77155df7ce401d68ccf4ff329616156e8230d2a0f2cdb6"}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x8}}, @NFQA_EXP={0x54, 0xf, 0x0, 0x1, [@CTA_EXPECT_HELP_NAME={0xa, 0x6, 'Q.931\x00'}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xff}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x689aeae9}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'snmp\x00'}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x83}, @NFQA_EXP={0x220, 0xf, 0x0, 0x1, [@CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_MASTER={0x50, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @CTA_EXPECT_NAT={0xc, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_NAT={0x154, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x20, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x110, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0x38}}, {0x14, 0x4, @private2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, [], 0x1}}, {0x14, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010102}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0={0xfc, 0x0, [], 0x1}}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010101}, {0x8, 0x2, @multicast2}}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_MASK={0x58, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x15}}}}]}]}]}, 0x420}, 0x1, 0x0, 0x0, 0x40090}, 0x4) [ 276.729414][ T9330] ? __copy_msghdr_from_user+0x2b4/0x4b0 [ 276.735073][ T9330] inet_sendmsg+0x99/0xe0 [ 276.739523][ T9330] ? inet_send_prepare+0x4d0/0x4d0 [ 276.744776][ T9330] sock_sendmsg+0xcf/0x120 [ 276.749219][ T9330] ____sys_sendmsg+0x6e8/0x810 [ 276.754085][ T9330] ? kernel_sendmsg+0x50/0x50 [ 276.758776][ T9330] ? do_recvmmsg+0x700/0x700 [ 276.763398][ T9330] ? lockdep_hardirqs_on_prepare+0x530/0x530 [ 276.769400][ T9330] ? _parse_integer+0x132/0x180 [ 276.774281][ T9330] ___sys_sendmsg+0xf3/0x170 10:59:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 276.778875][ T9330] ? sendmsg_copy_msghdr+0x160/0x160 [ 276.784172][ T9330] ? lock_downgrade+0x830/0x830 [ 276.789036][ T9330] ? lock_is_held_type+0xbb/0xf0 [ 276.793992][ T9330] ? find_held_lock+0x2d/0x110 [ 276.798772][ T9330] ? ksys_write+0x212/0x250 [ 276.803300][ T9330] ? __fget_files+0x294/0x400 [ 276.807997][ T9330] ? __fget_light+0xea/0x280 [ 276.812608][ T9330] __sys_sendmsg+0xe5/0x1b0 [ 276.817388][ T9330] ? __sys_sendmsg_sock+0xb0/0xb0 [ 276.822441][ T9330] ? check_preemption_disabled+0x50/0x130 [ 276.828180][ T9330] ? syscall_enter_from_user_mode+0x1d/0x60 [ 276.834110][ T9330] do_syscall_64+0x2d/0x70 [ 276.838541][ T9330] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 276.844438][ T9330] RIP: 0033:0x45e179 [ 276.848328][ T9330] Code: 3d b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 0b b2 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.867937][ T9330] RSP: 002b:00007f4058733c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 10:59:47 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RRENAMEAT(r1, &(0x7f0000000000)={0x7, 0x4b, 0x1}, 0x7) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0xa76, 0xff, 0x0, 0x7fffffff}]}) semop(0x0, 0x0, 0x0) 10:59:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 276.876353][ T9330] RAX: ffffffffffffffda RBX: 000000000002d200 RCX: 000000000045e179 [ 276.884315][ T9330] RDX: 0000000000000000 RSI: 0000000020000540 RDI: 0000000000000003 [ 276.892292][ T9330] RBP: 00007f4058733ca0 R08: 0000000000000000 R09: 0000000000000000 [ 276.900246][ T9330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 276.908201][ T9330] R13: 00007ffda7a0ec7f R14: 00007f40587349c0 R15: 000000000118cf4c [ 277.247624][ T9342] EXT4-fs error (device loop2): ext4_quota_enable:6124: comm syz-executor.2: Bad quota inode # 3 [ 277.283471][ T9342] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 10:59:47 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) [ 277.320838][ T9355] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 277.370543][ T9342] EXT4-fs (loop2): mount failed [ 277.377888][ T9354] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 10:59:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:48 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec, 0x1b, 0x0}, 0x0) 10:59:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:48 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:48 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x2}, 0x1b, 0x0}, 0x0) [ 277.789673][ T9375] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 277.828356][ T9383] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 277.868360][ T9383] EXT4-fs (loop3): re-mounted. Opts: [ 277.876735][ T9381] EXT4-fs error (device loop2): ext4_quota_enable:6124: comm syz-executor.2: Bad quota inode # 3 10:59:48 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x3}, 0x1b, 0x0}, 0x0) 10:59:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 278.008045][ T9381] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 278.130838][ T9381] EXT4-fs (loop2): mount failed 10:59:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="1f00000002031900000007000000e3800802bb0509000100010100", 0x1b}, {&(0x7f0000000300)="513abcbc", 0x4}], 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x3c, 0x0, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x20}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x94aa}]}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40080}, 0x0) r3 = socket$netlink(0x10, 0x3, 0xc) writev(r3, &(0x7f0000000200)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'sit0\x00'}) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280)=0x400, 0x4) r4 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9, 0x400) fcntl$setsig(r4, 0xa, 0x1c) sendmsg$NFQNL_MSG_VERDICT(r4, &(0x7f00000007c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000780)={&(0x7f0000000340)={0x420, 0x1, 0x3, 0x201, 0x0, 0x0, {0x7, 0x0, 0x9}, [@NFQA_PAYLOAD={0x7e, 0xa, "21f502c058f496ff78010fc636131bd68518ae3f9e825bc352dd1ee6d632d54f8c209746f409437c2fa7ed7015d60739ac6fe8fedf5fed2129db2c3e100eb0e161cfcd5915f411479aa1a4848c588162f9d42bbab03b7c80ee6e3ebaa1c8175fbac7e1671de90ddc7fa4a1f0e08a6d2b1e734997ad597c25d4a5"}, @NFQA_CT={0xc, 0xb, 0x0, 0x1, [@CTA_MARK_MASK={0x8}]}, @NFQA_VLAN={0x1c, 0x13, 0x0, 0x1, [@NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x18aa8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_TCI={0x6}]}, @NFQA_VLAN={0x2c, 0x13, 0x0, 0x1, [@NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x8}, @NFQA_VLAN_TCI={0x6, 0x2, 0x1, 0x0, 0x3}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x88a8}, @NFQA_VLAN_PROTO={0x6, 0x1, 0x1, 0x0, 0x8100}]}, @NFQA_PAYLOAD={0xad, 0xa, "7d2090d91f4f60e3a6da8d86442948241ffb11ff2efd84fda243f9cbf915ac879108a679c8a9d8dd784c6ec25d9b3cc4b3e5f2b4d65c868d45ee38fd711b31af4cb11552c57b5c58748f25aeeef877e22c7dec7bda47b0d44611c221bda46704af3fcb4806885954ad8da981fcd93004725d0ea0ce7c0ca3c24e406ab2c100a8f5333b96502e7b7f0d322ad5ab3ed9ef5fda77155df7ce401d68ccf4ff329616156e8230d2a0f2cdb6"}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffd, 0x8}}, @NFQA_EXP={0x54, 0xf, 0x0, 0x1, [@CTA_EXPECT_HELP_NAME={0xa, 0x6, 'Q.931\x00'}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xff}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x689aeae9}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'snmp\x00'}]}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x83}, @NFQA_EXP={0x220, 0xf, 0x0, 0x1, [@CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_MASTER={0x50, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1f}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @private0}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}]}, @CTA_EXPECT_NAT={0xc, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'syz0\x00'}, @CTA_EXPECT_NAT={0x154, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x20, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @local}}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x110, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, [], 0x38}}, {0x14, 0x4, @private2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, [], 0x1}}, {0x14, 0x4, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010102}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @local}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private0={0xfc, 0x0, [], 0x1}}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010101}, {0x8, 0x2, @multicast2}}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}]}, @CTA_EXPECT_MASK={0x58, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x15}}}}]}]}]}, 0x420}, 0x1, 0x0, 0x0, 0x40090}, 0x4) 10:59:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:48 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x4}, 0x1b, 0x0}, 0x0) 10:59:48 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:48 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:49 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x5}, 0x1b, 0x0}, 0x0) 10:59:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008188040f80ecdb4cb9cca7480ef40e000000e3bd6efb440009000e0004000d000000008000001201", 0x2e}], 0x1}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x480883, 0x40, 0x4}, 0x18) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000001c0)={0xea, 0x1}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8220, 0x5, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b00820000ff0f0000ffffffffffffffffffffffffffffffff73797a6b616c73797a6b616c00"/64, 0x40}, {&(0x7f0000010100)="0200000041000000500000001f82000002000000ed41000000000000010000000200000093c1645f93c1645f93c1645f00"/64, 0x40, 0x200}, {&(0x7f0000010200)="02002e0000000000000000000000000002002e2e00"/32, 0x20, 0x8200}, {&(0x7f0000000280)="12071bb638a423d41ead39e1827bc152e6d79d1dd8a439f96a061635ec2837c7d1af97a219b4e0a0dbf58bea51a2c09a863cd203088c9586fc0a2c5bebe2bff458f6a6242bd8a8dea52ea8b14b398d472a67ff6346db1b9ef0b94e55f52a78a7b9c676be4b7e57cef6f30469903c136a15100f5ca22ca604c335d12833926c3745dbe6050baf02f19531aa38c79d22ce11ce9764c5ccc1dad9abf58b56b1d410283348eee9b4b0e2c382ebc9f72e99cf1a1f715856", 0xb5, 0x9}, {&(0x7f0000000340)="f70a21cf452d20dad594f0901aaaa36d192a39846f2196437918", 0x1a, 0x7ff}], 0x0, &(0x7f0000010300)) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) [ 278.433209][ T9409] EXT4-fs error (device loop5): ext4_quota_enable:6124: comm syz-executor.5: Bad quota inode # 3 10:59:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 278.494460][ T9409] EXT4-fs warning (device loop5): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 278.560432][ T9413] EXT4-fs error (device loop2): ext4_quota_enable:6124: comm syz-executor.2: Bad quota inode # 3 10:59:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 278.624056][ T9409] EXT4-fs (loop5): mount failed [ 278.637094][ T9413] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 278.665521][ T9421] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 10:59:49 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x6}, 0x1b, 0x0}, 0x0) [ 278.711133][ T9413] EXT4-fs (loop2): mount failed 10:59:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x109801, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x74000000) write$dsp(r0, &(0x7f0000002000)='`', 0x80000) bind$l2tp(0xffffffffffffffff, 0x0, 0x0) 10:59:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 279.174115][ T9421] BFS-fs: bfs_fill_super(): loop0 is unclean, continuing [ 279.274279][ T9421] BFS-fs: bfs_fill_super(): WARNING: filesystem loop0 was created with 512 inodes, the real maximum is 511, mounting anyway 10:59:49 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:50 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x7}, 0x1b, 0x0}, 0x0) 10:59:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 279.415882][ T9421] BFS-fs: bfs_fill_super(): Last block not available on loop0: 885640 [ 279.451882][ T9424] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 10:59:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 279.572297][ T9442] EXT4-fs error (device loop2): ext4_quota_enable:6124: comm syz-executor.2: Bad quota inode # 3 10:59:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008188040f80ecdb4cb9cca7480ef40e000000e3bd6efb440009000e0004000d000000008000001201", 0x2e}], 0x1}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x480883, 0x40, 0x4}, 0x18) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000001c0)={0xea, 0x1}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8220, 0x5, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b00820000ff0f0000ffffffffffffffffffffffffffffffff73797a6b616c73797a6b616c00"/64, 0x40}, {&(0x7f0000010100)="0200000041000000500000001f82000002000000ed41000000000000010000000200000093c1645f93c1645f93c1645f00"/64, 0x40, 0x200}, {&(0x7f0000010200)="02002e0000000000000000000000000002002e2e00"/32, 0x20, 0x8200}, {&(0x7f0000000280)="12071bb638a423d41ead39e1827bc152e6d79d1dd8a439f96a061635ec2837c7d1af97a219b4e0a0dbf58bea51a2c09a863cd203088c9586fc0a2c5bebe2bff458f6a6242bd8a8dea52ea8b14b398d472a67ff6346db1b9ef0b94e55f52a78a7b9c676be4b7e57cef6f30469903c136a15100f5ca22ca604c335d12833926c3745dbe6050baf02f19531aa38c79d22ce11ce9764c5ccc1dad9abf58b56b1d410283348eee9b4b0e2c382ebc9f72e99cf1a1f715856", 0xb5, 0x9}, {&(0x7f0000000340)="f70a21cf452d20dad594f0901aaaa36d192a39846f2196437918", 0x1a, 0x7ff}], 0x0, &(0x7f0000010300)) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) 10:59:50 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x8}, 0x1b, 0x0}, 0x0) [ 279.721037][ T9442] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 279.777876][ T9442] EXT4-fs (loop2): mount failed 10:59:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:50 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:50 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x9}, 0x1b, 0x0}, 0x0) [ 279.983880][ T9461] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 10:59:50 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 280.150397][ T9461] BFS-fs: bfs_fill_super(): loop0 is unclean, continuing [ 280.175823][ T9461] BFS-fs: bfs_fill_super(): WARNING: filesystem loop0 was created with 512 inodes, the real maximum is 511, mounting anyway [ 280.190079][ T9467] EXT4-fs error (device loop2): ext4_quota_enable:6124: comm syz-executor.2: Bad quota inode # 3 [ 280.254087][ T9467] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 280.352852][ T9461] BFS-fs: bfs_fill_super(): Last block not available on loop0: 885640 [ 280.436844][ T9467] EXT4-fs (loop2): mount failed 10:59:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x109801, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x74000000) write$dsp(r0, &(0x7f0000002000)='`', 0x80000) bind$l2tp(0xffffffffffffffff, 0x0, 0x0) 10:59:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008188040f80ecdb4cb9cca7480ef40e000000e3bd6efb440009000e0004000d000000008000001201", 0x2e}], 0x1}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x480883, 0x40, 0x4}, 0x18) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000001c0)={0xea, 0x1}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8220, 0x5, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b00820000ff0f0000ffffffffffffffffffffffffffffffff73797a6b616c73797a6b616c00"/64, 0x40}, {&(0x7f0000010100)="0200000041000000500000001f82000002000000ed41000000000000010000000200000093c1645f93c1645f93c1645f00"/64, 0x40, 0x200}, {&(0x7f0000010200)="02002e0000000000000000000000000002002e2e00"/32, 0x20, 0x8200}, {&(0x7f0000000280)="12071bb638a423d41ead39e1827bc152e6d79d1dd8a439f96a061635ec2837c7d1af97a219b4e0a0dbf58bea51a2c09a863cd203088c9586fc0a2c5bebe2bff458f6a6242bd8a8dea52ea8b14b398d472a67ff6346db1b9ef0b94e55f52a78a7b9c676be4b7e57cef6f30469903c136a15100f5ca22ca604c335d12833926c3745dbe6050baf02f19531aa38c79d22ce11ce9764c5ccc1dad9abf58b56b1d410283348eee9b4b0e2c382ebc9f72e99cf1a1f715856", 0xb5, 0x9}, {&(0x7f0000000340)="f70a21cf452d20dad594f0901aaaa36d192a39846f2196437918", 0x1a, 0x7ff}], 0x0, &(0x7f0000010300)) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) 10:59:52 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0xa}, 0x1b, 0x0}, 0x0) 10:59:52 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:52 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:52 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {0x0, 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:52 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0xe}, 0x1b, 0x0}, 0x0) [ 282.264716][ T9494] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 282.386858][ T9499] BFS-fs: bfs_fill_super(): loop0 is unclean, continuing [ 282.397308][ T9497] EXT4-fs error (device loop2): ext4_quota_enable:6124: comm syz-executor.2: Bad quota inode # 3 10:59:53 executing program 4: syz_mount_image$ext4(0x0, &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 282.425929][ T9497] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 282.438444][ T9499] BFS-fs: bfs_fill_super(): WARNING: filesystem loop0 was created with 512 inodes, the real maximum is 511, mounting anyway [ 282.477115][ T9497] EXT4-fs (loop2): mount failed 10:59:53 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x11}, 0x1b, 0x0}, 0x0) 10:59:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 282.499030][ T9499] BFS-fs: bfs_fill_super(): Last block not available on loop0: 885640 10:59:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 282.920387][ T9525] EXT4-fs error (device loop2): ext4_quota_enable:6124: comm syz-executor.2: Bad quota inode # 3 [ 282.965391][ T9525] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 283.048611][ T9525] EXT4-fs (loop2): mount failed 10:59:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp1\x00', 0x109801, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)=0x74000000) write$dsp(r0, &(0x7f0000002000)='`', 0x80000) bind$l2tp(0xffffffffffffffff, 0x0, 0x0) 10:59:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008188040f80ecdb4cb9cca7480ef40e000000e3bd6efb440009000e0004000d000000008000001201", 0x2e}], 0x1}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x480883, 0x40, 0x4}, 0x18) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000001c0)={0xea, 0x1}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8220, 0x5, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b00820000ff0f0000ffffffffffffffffffffffffffffffff73797a6b616c73797a6b616c00"/64, 0x40}, {&(0x7f0000010100)="0200000041000000500000001f82000002000000ed41000000000000010000000200000093c1645f93c1645f93c1645f00"/64, 0x40, 0x200}, {&(0x7f0000010200)="02002e0000000000000000000000000002002e2e00"/32, 0x20, 0x8200}, {&(0x7f0000000280)="12071bb638a423d41ead39e1827bc152e6d79d1dd8a439f96a061635ec2837c7d1af97a219b4e0a0dbf58bea51a2c09a863cd203088c9586fc0a2c5bebe2bff458f6a6242bd8a8dea52ea8b14b398d472a67ff6346db1b9ef0b94e55f52a78a7b9c676be4b7e57cef6f30469903c136a15100f5ca22ca604c335d12833926c3745dbe6050baf02f19531aa38c79d22ce11ce9764c5ccc1dad9abf58b56b1d410283348eee9b4b0e2c382ebc9f72e99cf1a1f715856", 0xb5, 0x9}, {&(0x7f0000000340)="f70a21cf452d20dad594f0901aaaa36d192a39846f2196437918", 0x1a, 0x7ff}], 0x0, &(0x7f0000010300)) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x3) 10:59:55 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x2c}, 0x1b, 0x0}, 0x0) 10:59:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:55 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 285.410803][ T9558] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 285.438214][ T9556] EXT4-fs error (device loop2): ext4_quota_enable:6124: comm syz-executor.2: Bad quota inode # 3 10:59:56 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x60}, 0x1b, 0x0}, 0x0) [ 285.450702][ T9556] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 285.468819][ T9556] EXT4-fs (loop2): mount failed [ 285.526729][ T9558] BFS-fs: bfs_fill_super(): loop0 is unclean, continuing [ 285.576010][ T9558] BFS-fs: bfs_fill_super(): WARNING: filesystem loop0 was created with 512 inodes, the real maximum is 511, mounting anyway [ 285.603336][ T9558] BFS-fs: bfs_fill_super(): Last block not available on loop0: 885640 10:59:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:56 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0xfc}, 0x1b, 0x0}, 0x0) 10:59:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008188040f80ecdb4cb9cca7480ef40e000000e3bd6efb440009000e0004000d000000008000001201", 0x2e}], 0x1}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x480883, 0x40, 0x4}, 0x18) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000001c0)={0xea, 0x1}) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4000, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8220, 0x5, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b00820000ff0f0000ffffffffffffffffffffffffffffffff73797a6b616c73797a6b616c00"/64, 0x40}, {&(0x7f0000010100)="0200000041000000500000001f82000002000000ed41000000000000010000000200000093c1645f93c1645f93c1645f00"/64, 0x40, 0x200}, {&(0x7f0000010200)="02002e0000000000000000000000000002002e2e00"/32, 0x20, 0x8200}, {&(0x7f0000000280)="12071bb638a423d41ead39e1827bc152e6d79d1dd8a439f96a061635ec2837c7d1af97a219b4e0a0dbf58bea51a2c09a863cd203088c9586fc0a2c5bebe2bff458f6a6242bd8a8dea52ea8b14b398d472a67ff6346db1b9ef0b94e55f52a78a7b9c676be4b7e57cef6f30469903c136a15100f5ca22ca604c335d12833926c3745dbe6050baf02f19531aa38c79d22ce11ce9764c5ccc1dad9abf58b56b1d410283348eee9b4b0e2c382ebc9f72e99cf1a1f715856", 0xb5, 0x9}, {&(0x7f0000000340)="f70a21cf452d20dad594f0901aaaa36d192a39846f2196437918", 0x1a, 0x7ff}], 0x0, &(0x7f0000010300)) 10:59:56 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080), 0x0, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 285.945154][ T9586] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 286.063586][ T9586] BFS-fs: bfs_fill_super(): loop0 is unclean, continuing [ 286.122172][ T9586] BFS-fs: bfs_fill_super(): WARNING: filesystem loop0 was created with 512 inodes, the real maximum is 511, mounting anyway [ 286.158842][ T9592] EXT4-fs error (device loop2): ext4_quota_enable:6124: comm syz-executor.2: Bad quota inode # 3 [ 286.202811][ T9592] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 286.271812][ T9592] EXT4-fs (loop2): mount failed [ 286.307813][ T9586] BFS-fs: bfs_fill_super(): Last block not available on loop0: 885640 10:59:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:59 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x1f4}, 0x1b, 0x0}, 0x0) 10:59:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008188040f80ecdb4cb9cca7480ef40e000000e3bd6efb440009000e0004000d000000008000001201", 0x2e}], 0x1}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x480883, 0x40, 0x4}, 0x18) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000001c0)={0xea, 0x1}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4000, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8220, 0x5, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b00820000ff0f0000ffffffffffffffffffffffffffffffff73797a6b616c73797a6b616c00"/64, 0x40}, {&(0x7f0000010100)="0200000041000000500000001f82000002000000ed41000000000000010000000200000093c1645f93c1645f93c1645f00"/64, 0x40, 0x200}, {&(0x7f0000010200)="02002e0000000000000000000000000002002e2e00"/32, 0x20, 0x8200}, {&(0x7f0000000280)="12071bb638a423d41ead39e1827bc152e6d79d1dd8a439f96a061635ec2837c7d1af97a219b4e0a0dbf58bea51a2c09a863cd203088c9586fc0a2c5bebe2bff458f6a6242bd8a8dea52ea8b14b398d472a67ff6346db1b9ef0b94e55f52a78a7b9c676be4b7e57cef6f30469903c136a15100f5ca22ca604c335d12833926c3745dbe6050baf02f19531aa38c79d22ce11ce9764c5ccc1dad9abf58b56b1d410283348eee9b4b0e2c382ebc9f72e99cf1a1f715856", 0xb5, 0x9}, {&(0x7f0000000340)="f70a21cf452d20dad594f0901aaaa36d192a39846f2196437918", 0x1a, 0x7ff}], 0x0, &(0x7f0000010300)) 10:59:59 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 288.494246][ T9623] netlink: 'syz-executor.0': attribute type 4 has an invalid length. [ 288.518792][ T9625] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 288.519216][ T9621] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (96 blocks) [ 288.540961][ T9625] EXT4-fs (loop2): mount failed 10:59:59 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x300}, 0x1b, 0x0}, 0x0) [ 288.663256][ T9626] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (96 blocks) 10:59:59 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f0000000000000100800000", 0x1f, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x2010, r0, 0x8c377000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:59 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x3e8}, 0x1b, 0x0}, 0x0) [ 288.763271][ T9632] BFS-fs: bfs_fill_super(): loop0 is unclean, continuing [ 288.773102][ T9632] BFS-fs: bfs_fill_super(): WARNING: filesystem loop0 was created with 512 inodes, the real maximum is 511, mounting anyway [ 288.821169][ T9632] BFS-fs: bfs_fill_super(): Last block not available on loop0: 885640 10:59:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:59 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000008c0)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) 10:59:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e00000010008188040f80ecdb4cb9cca7480ef40e000000e3bd6efb440009000e0004000d000000008000001201", 0x2e}], 0x1}, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x480883, 0x40, 0x4}, 0x18) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000001c0)={0xea, 0x1}) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000100)='./file0\x00', 0x8220, 0x5, &(0x7f0000000380)=[{&(0x7f0000010000)="cefaad1b00820000ff0f0000ffffffffffffffffffffffffffffffff73797a6b616c73797a6b616c00"/64, 0x40}, {&(0x7f0000010100)="0200000041000000500000001f82000002000000ed41000000000000010000000200000093c1645f93c1645f93c1645f00"/64, 0x40, 0x200}, {&(0x7f0000010200)="02002e0000000000000000000000000002002e2e00"/32, 0x20, 0x8200}, {&(0x7f0000000280)="12071bb638a423d41ead39e1827bc152e6d79d1dd8a439f96a061635ec2837c7d1af97a219b4e0a0dbf58bea51a2c09a863cd203088c9586fc0a2c5bebe2bff458f6a6242bd8a8dea52ea8b14b398d472a67ff6346db1b9ef0b94e55f52a78a7b9c676be4b7e57cef6f30469903c136a15100f5ca22ca604c335d12833926c3745dbe6050baf02f19531aa38c79d22ce11ce9764c5ccc1dad9abf58b56b1d410283348eee9b4b0e2c382ebc9f72e99cf1a1f715856", 0xb5, 0x9}, {&(0x7f0000000340)="f70a21cf452d20dad594f0901aaaa36d192a39846f2196437918", 0x1a, 0x7ff}], 0x0, &(0x7f0000010300)) 10:59:59 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x500}, 0x1b, 0x0}, 0x0) 10:59:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280)) [ 289.039131][ T9658] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (96 blocks) [ 289.058020][ T9651] EXT4-fs warning (device loop2): ext4_enable_quotas:6161: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 289.114911][ T9651] EXT4-fs (loop2): mount failed [ 289.141642][ T9662] EXT4-fs (loop3): bad geometry: block count 512 exceeds size of device (96 blocks) 10:59:59 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f00000042c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) 10:59:59 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000240)=@nl=@unspec={0x600}, 0x1b, 0x0}, 0x0) [ 289.217377][ T9672] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 10:59:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000008c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000080)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901", 0x5, 0x30000}], 0x0, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xdf000000, 0x0, 0x67, &(0x7f0000001280))