x291/0x3b0 [ 248.323948] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 248.328817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 248.328830] RIP: 0033:0x411171 12:54:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:51 executing program 1: r0 = socket$inet6(0xa, 0x101ffffffffff, 0x80000001) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x26, 0x800) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x14, 0x4ed, 0x4, 0x0, r1, 0x4}, 0x2c) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={'\x00', {0x2, 0x4e24, @rand_addr=0x1f}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000007126000000000000bf67000000000000570600000f0000006706000002000000070600000ee619f2bf250000000000001f6500000000000067070000000000000707000099741df70f75000000000000bf5400000000000007000000040000003d43010000000000950000000000000061160000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00'}, 0x48) [ 248.328849] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 248.356172] RSP: 002b:00007f83c6b33a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 248.363911] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000411171 [ 248.371207] RDX: 00007f83c6b33afa RSI: 0000000000000002 RDI: 00007f83c6b33af0 [ 248.378500] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 248.385789] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 248.393079] R13: 0000000000000001 R14: 00000000004d7d28 R15: 0000000000000003 12:54:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x541b, &(0x7f0000000000)) 12:54:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000), 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="4596c1727ba6ef40464adc4f0f00fe000030492a768b112c126728"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRES16=r0], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206, 0x0, 0x4}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f0000000540)="a72d90fc9813e72359c6202ce48fc49f48b22808a4e3abd786b9dc5dad1cda542d3015e68f6f5a", 0xe21, 0x342, &(0x7f0000000480)=""/187, 0x0, 0x0, [], 0x0, 0xe}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000680)={@dev, @loopback, 0x0}, &(0x7f00000006c0)=0xc) getsockname(r2, &(0x7f0000000880)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000900)=0x80) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@local}}, &(0x7f0000000b00)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b40)={@remote, 0x0}, &(0x7f0000000b80)=0x14) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000e80)={0x0, @empty, @multicast1}, &(0x7f0000000ec0)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000f80)={'bond_slave_1\x00', 0x0}) getpeername$packet(r2, &(0x7f0000000fc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001000)=0x14) getpeername$packet(r2, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001080)=0x14) accept$packet(r2, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001100)=0x14) getsockname$packet(r2, &(0x7f0000002980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000029c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000002e40)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000002e00)={&(0x7f0000002a00)={0x3c4, r3, 0x1, 0x70bd2a, 0x25dfdbff, {}, [{{0x8, 0x1, r4}, {0x130, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x2, 0x70, 0x1, 0x7}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0xf0, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r9}, {0xbc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r12}, {0xb4, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}]}}]}, 0x3c4}, 0x1, 0x0, 0x0, 0x10}, 0x40000) r14 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000740)='/dev/hwrng\x00', 0x10d401, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000005c0)={r14, r1}) 12:54:51 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000008c0)={"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"}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000400)={0x2, 0x0, @pic={0x8, 0x4, 0xea96, 0xde7, 0x5, 0x5, 0x2, 0xe99, 0x7, 0x7f, 0xffff, 0x1, 0x1, 0x0, 0x0, 0x4c2}}) 12:54:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 248.770887] FAULT_INJECTION: forcing a failure. [ 248.770887] name failslab, interval 1, probability 0, space 0, times 0 [ 248.789299] CPU: 1 PID: 8817 Comm: syz-executor2 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 248.797842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 248.807216] Call Trace: [ 248.807249] dump_stack+0x244/0x3ab [ 248.807270] ? dump_stack_print_info.cold.2+0x52/0x52 [ 248.807293] ? mark_held_locks+0x130/0x130 [ 248.807316] should_fail.cold.4+0xa/0x17 [ 248.827030] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 248.832164] ? down_write_nested+0x130/0x130 [ 248.836598] ? down_read+0x120/0x120 [ 248.840362] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 248.845990] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 248.846009] ? lock_acquire+0x1ed/0x520 [ 248.846028] ? lo_ioctl+0x8e/0x1d60 [ 248.859203] ? lock_release+0xa10/0xa10 [ 248.859223] ? perf_trace_sched_process_exec+0x860/0x860 [ 248.868687] ? fs_reclaim_acquire+0x20/0x20 [ 248.868710] ? lock_downgrade+0x900/0x900 [ 248.877202] ? perf_trace_sched_process_exec+0x860/0x860 [ 248.882694] __should_failslab+0x124/0x180 [ 248.886944] should_failslab+0x9/0x14 [ 248.886962] kmem_cache_alloc_trace+0x2d7/0x750 [ 248.886984] __kthread_create_on_node+0x137/0x540 [ 248.895462] ? loop_get_status64+0x140/0x140 [ 248.895478] ? kthread_parkme+0xb0/0xb0 [ 248.895502] ? ksys_dup3+0x680/0x680 [ 248.895522] ? __lockdep_init_map+0x105/0x590 [ 248.917068] ? __lockdep_init_map+0x105/0x590 [ 248.921584] ? loop_get_status64+0x140/0x140 [ 248.926042] kthread_create_on_node+0xb1/0xe0 [ 248.930564] ? __kthread_create_on_node+0x540/0x540 [ 248.935604] ? kasan_check_read+0x11/0x20 [ 248.939802] lo_ioctl+0x7f6/0x1d60 [ 248.943367] ? lo_rw_aio+0x1ef0/0x1ef0 [ 248.947292] blkdev_ioctl+0x9ac/0x2010 [ 248.951203] ? blkpg_ioctl+0xc10/0xc10 [ 248.955109] ? lock_downgrade+0x900/0x900 [ 248.959286] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 248.964238] ? save_stack+0x43/0xd0 [ 248.967880] ? __kasan_slab_free+0x102/0x150 [ 248.972311] ? __fget+0x4d1/0x740 [ 248.975790] ? ksys_dup3+0x680/0x680 [ 248.979554] block_ioctl+0xee/0x130 [ 248.983327] ? blkdev_fallocate+0x400/0x400 [ 248.987683] do_vfs_ioctl+0x1de/0x1720 [ 248.991589] ? trace_hardirqs_on+0xbd/0x310 [ 248.995961] ? ioctl_preallocate+0x300/0x300 [ 249.000389] ? __fget_light+0x2e9/0x430 [ 249.004387] ? fget_raw+0x20/0x20 [ 249.007901] ? putname+0xf2/0x130 [ 249.011372] ? kmem_cache_free+0x21a/0x290 [ 249.015649] ? putname+0xf7/0x130 [ 249.019123] ? do_sys_open+0x3ac/0x700 [ 249.023036] ? security_file_ioctl+0x94/0xc0 [ 249.027467] ksys_ioctl+0xa9/0xd0 [ 249.030944] __x64_sys_ioctl+0x73/0xb0 [ 249.035042] do_syscall_64+0x1b9/0x820 [ 249.038949] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 249.044340] ? syscall_return_slowpath+0x5e0/0x5e0 [ 249.049295] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.054234] ? trace_hardirqs_on_caller+0x310/0x310 [ 249.059364] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 249.064408] ? prepare_exit_to_usermode+0x291/0x3b0 [ 249.069448] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.074404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.079607] RIP: 0033:0x457387 [ 249.082851] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.101772] RSP: 002b:00007f83c6b33a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 249.109505] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000457387 12:54:52 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={"6e72300100", 0x2301}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10001, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x6) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x4) 12:54:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 249.116794] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 249.124078] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 249.131373] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 249.138681] R13: 0000000000000001 R14: 00000000004d7d28 R15: 0000000000000003 [ 249.166991] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 12:54:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x9) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x4000) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x2, 0x1}, 0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x2, 0x8, 0x0, 0x0, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={r1, 0x401}, &(0x7f0000000140)=0x8) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) 12:54:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = memfd_create(&(0x7f00000004c0)="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", 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f00000000c0)) getsockopt$netlink(r2, 0x10e, 0x3, &(0x7f0000000040)=""/22, &(0x7f0000000080)=0x16) sendfile(r0, r2, &(0x7f0000000240)=0xa4, 0x20000102000007) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x400) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000100)=0x1) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000200), 0x4) ioctl$KVM_SET_TSS_ADDR(0xffffffffffffffff, 0xae47, 0xd000) syslog(0x9, &(0x7f0000000280)=""/90, 0x5a) 12:54:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0189436, &(0x7f0000000000)) 12:54:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:52 executing program 4: socket$inet(0x2, 0x0, 0x0) socketpair(0xd, 0x4, 0x3f, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f00000003c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000480)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(0xffffffffffffffff, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0x7ffff000}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xe6}], 0x3}}], 0x1, 0x0, &(0x7f0000008bc0)) 12:54:52 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 249.332346] sched: DL replenish lagged too much [ 249.369258] FAULT_INJECTION: forcing a failure. [ 249.369258] name failslab, interval 1, probability 0, space 0, times 0 [ 249.382245] CPU: 0 PID: 8856 Comm: syz-executor2 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 249.390687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 249.400148] Call Trace: [ 249.403300] dump_stack+0x244/0x3ab [ 249.406967] ? dump_stack_print_info.cold.2+0x52/0x52 [ 249.412260] ? debug_smp_processor_id+0x1c/0x20 [ 249.416974] ? rcu_preempt_need_deferred_qs+0x74/0x1f0 [ 249.422280] should_fail.cold.4+0xa/0x17 [ 249.426376] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 249.431507] ? pick_next_task_fair+0xa05/0x1b30 [ 249.436208] ? rcu_qs+0x23/0x110 [ 249.439605] ? rcu_note_context_switch+0x7d3/0x2150 [ 249.444702] ? enqueue_entity+0x34b/0x20d0 [ 249.448990] ? run_rebalance_domains+0x500/0x500 [ 249.453776] ? __account_cfs_rq_runtime+0x790/0x790 [ 249.458823] ? rcu_softirq_qs+0x20/0x20 [ 249.462827] ? update_curr+0x200/0xbd0 [ 249.466746] ? fs_reclaim_acquire+0x20/0x20 [ 249.471096] ? lock_downgrade+0x900/0x900 [ 249.475275] ? perf_trace_sched_process_exec+0x860/0x860 [ 249.480844] ? enqueue_entity+0x34b/0x20d0 [ 249.485108] __should_failslab+0x124/0x180 [ 249.489372] should_failslab+0x9/0x14 [ 249.493320] kmem_cache_alloc+0x2be/0x730 [ 249.497497] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 249.502669] __kernfs_new_node+0x127/0x8d0 [ 249.506940] ? trace_hardirqs_off_caller+0x300/0x300 [ 249.512067] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 249.516854] ? _raw_spin_unlock_irq+0x60/0x80 [ 249.521374] ? __schedule+0x168b/0x21d0 [ 249.525378] ? __sched_text_start+0x8/0x8 [ 249.529554] ? check_preempt_curr+0x3a0/0x3a0 [ 249.534077] ? trace_hardirqs_on+0xbd/0x310 [ 249.538418] ? kasan_check_read+0x11/0x20 [ 249.542596] ? enqueue_task_fair+0x24d/0xa50 [ 249.547075] ? enqueue_entity+0x20d0/0x20d0 [ 249.551431] kernfs_new_node+0x95/0x120 [ 249.555449] kernfs_create_dir_ns+0x4d/0x160 [ 249.559901] internal_create_group+0x5fc/0xd80 [ 249.564514] ? remove_files.isra.1+0x190/0x190 [ 249.569125] ? up_write+0x7b/0x220 [ 249.572691] ? down_write_nested+0x130/0x130 [ 249.577119] ? down_read+0x120/0x120 [ 249.580864] sysfs_create_group+0x1f/0x30 [ 249.585033] lo_ioctl+0x1307/0x1d60 [ 249.588700] ? lo_rw_aio+0x1ef0/0x1ef0 [ 249.592640] blkdev_ioctl+0x9ac/0x2010 [ 249.596561] ? blkpg_ioctl+0xc10/0xc10 [ 249.600475] ? lock_downgrade+0x900/0x900 [ 249.604681] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 249.609672] ? save_stack+0x43/0xd0 [ 249.613323] ? __kasan_slab_free+0x102/0x150 [ 249.617762] ? __fget+0x4d1/0x740 [ 249.621241] ? ksys_dup3+0x680/0x680 [ 249.624982] block_ioctl+0xee/0x130 [ 249.628665] ? blkdev_fallocate+0x400/0x400 [ 249.633015] do_vfs_ioctl+0x1de/0x1720 [ 249.636931] ? trace_hardirqs_on+0xbd/0x310 [ 249.641273] ? ioctl_preallocate+0x300/0x300 [ 249.645828] ? __fget_light+0x2e9/0x430 [ 249.649825] ? fget_raw+0x20/0x20 [ 249.653301] ? putname+0xf2/0x130 [ 249.656899] ? kmem_cache_free+0x21a/0x290 [ 249.661156] ? putname+0xf7/0x130 [ 249.664668] ? do_sys_open+0x3ac/0x700 [ 249.668680] ? security_file_ioctl+0x94/0xc0 [ 249.673118] ksys_ioctl+0xa9/0xd0 [ 249.676596] __x64_sys_ioctl+0x73/0xb0 [ 249.680538] do_syscall_64+0x1b9/0x820 [ 249.684568] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 249.689955] ? syscall_return_slowpath+0x5e0/0x5e0 [ 249.694912] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.699786] ? trace_hardirqs_on_caller+0x310/0x310 [ 249.704833] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 249.709873] ? prepare_exit_to_usermode+0x291/0x3b0 [ 249.714921] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 249.719792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 249.724997] RIP: 0033:0x457387 [ 249.728213] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 249.747139] RSP: 002b:00007f83c6b33a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 249.754993] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000457387 [ 249.762284] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:54:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x0, &(0x7f00009ff000)=ANY=[], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5460, &(0x7f0000000000)) 12:54:52 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x20900, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x800000000000000) [ 249.769573] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 249.776866] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 249.784155] R13: 0000000000000001 R14: 00000000004d7d28 R15: 0000000000000003 [ 249.835350] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 249.868565] EXT4-fs (loop2): invalid inodes per group: 16384 [ 249.868565] [ 249.905043] Dead loop on virtual device ip6_vti0, fix it urgently! 12:54:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x0, &(0x7f00009ff000)=ANY=[], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:53 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) bind(r0, &(0x7f0000000180)=@hci={0x1f, r1}, 0x80) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000240)={{0x3, 0x3, 0x8, 0x3, 0x5}, 0x8, 0x40, 0x7fffffff}) unshare(0x8000400) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'syzkaller0\x00', 0x400}) perf_event_open(&(0x7f0000014f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0xf) [ 249.950014] Dead loop on virtual device ip6_vti0, fix it urgently! 12:54:53 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 250.001646] Dead loop on virtual device ip6_vti0, fix it urgently! 12:54:53 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000640)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x44, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="00634040000000000000000000000000000000000000000000000000000000000000000018000000000000000800000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB="852a627300000000", @ANYRES64=0x0, @ANYBLOB="090000000800000026eb700ee421dc24b8"], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000380)={0x8, 0x0, &(0x7f0000000500)=[@release], 0x0, 0x0, &(0x7f0000000400)}) 12:54:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40049409, &(0x7f0000000000)) [ 250.047946] Dead loop on virtual device ip6_vti0, fix it urgently! [ 250.060542] FAULT_INJECTION: forcing a failure. [ 250.060542] name failslab, interval 1, probability 0, space 0, times 0 12:54:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x0, &(0x7f00009ff000)=ANY=[], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 250.095036] Dead loop on virtual device ip6_vti0, fix it urgently! [ 250.111514] CPU: 0 PID: 8906 Comm: syz-executor2 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 250.119989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.127998] Dead loop on virtual device ip6_vti0, fix it urgently! [ 250.129446] Call Trace: [ 250.129479] dump_stack+0x244/0x3ab [ 250.129513] ? dump_stack_print_info.cold.2+0x52/0x52 [ 250.147255] ? radix_tree_tag_set+0x3d0/0x3d0 [ 250.151786] should_fail.cold.4+0xa/0x17 [ 250.156005] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 250.161139] ? __save_stack_trace+0x8d/0xf0 [ 250.165493] ? lock_acquire+0x1ed/0x520 [ 250.169500] ? kernfs_activate+0x8e/0x2c0 [ 250.173702] ? lock_release+0xa10/0xa10 [ 250.177705] ? perf_trace_sched_process_exec+0x860/0x860 [ 250.183189] ? fs_reclaim_acquire+0x20/0x20 [ 250.187537] ? lock_downgrade+0x900/0x900 [ 250.191719] ? perf_trace_sched_process_exec+0x860/0x860 [ 250.197251] __should_failslab+0x124/0x180 [ 250.201510] should_failslab+0x9/0x14 [ 250.205340] kmem_cache_alloc+0x2be/0x730 [ 250.209514] ? kasan_check_read+0x11/0x20 [ 250.213697] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 250.218740] __kernfs_new_node+0x127/0x8d0 [ 250.223082] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 250.227859] ? kasan_check_write+0x14/0x20 [ 250.232197] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 250.237153] ? __kernfs_new_node+0x697/0x8d0 [ 250.241592] ? wait_for_completion+0x8a0/0x8a0 [ 250.246232] ? kasan_check_write+0x14/0x20 [ 250.250492] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 250.255445] ? _raw_spin_unlock_irq+0x60/0x80 [ 250.259963] ? __schedule+0x168b/0x21d0 [ 250.263964] ? wait_for_completion+0x8a0/0x8a0 [ 250.268580] ? mutex_unlock+0xd/0x10 [ 250.272341] ? kernfs_activate+0x21a/0x2c0 [ 250.276605] kernfs_new_node+0x95/0x120 [ 250.280673] __kernfs_create_file+0x5a/0x340 [ 250.285113] sysfs_add_file_mode_ns+0x222/0x530 [ 250.289813] internal_create_group+0x3df/0xd80 [ 250.294427] ? remove_files.isra.1+0x190/0x190 [ 250.299212] ? up_write+0x7b/0x220 [ 250.302775] ? down_write_nested+0x130/0x130 [ 250.307379] ? down_read+0x120/0x120 [ 250.311126] sysfs_create_group+0x1f/0x30 [ 250.315300] lo_ioctl+0x1307/0x1d60 [ 250.318954] ? lo_rw_aio+0x1ef0/0x1ef0 [ 250.322866] blkdev_ioctl+0x9ac/0x2010 [ 250.326780] ? blkpg_ioctl+0xc10/0xc10 [ 250.330697] ? lock_downgrade+0x900/0x900 [ 250.334875] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 250.339833] ? save_stack+0x43/0xd0 [ 250.343486] ? __kasan_slab_free+0x102/0x150 [ 250.347940] ? __fget+0x4d1/0x740 [ 250.351443] ? ksys_dup3+0x680/0x680 [ 250.355187] block_ioctl+0xee/0x130 [ 250.358841] ? blkdev_fallocate+0x400/0x400 [ 250.363193] do_vfs_ioctl+0x1de/0x1720 [ 250.367106] ? trace_hardirqs_on+0xbd/0x310 [ 250.371460] ? ioctl_preallocate+0x300/0x300 [ 250.375898] ? __fget_light+0x2e9/0x430 [ 250.379896] ? fget_raw+0x20/0x20 [ 250.383372] ? putname+0xf2/0x130 [ 250.386855] ? kmem_cache_free+0x21a/0x290 [ 250.391261] ? putname+0xf7/0x130 [ 250.394739] ? do_sys_open+0x3ac/0x700 [ 250.398681] ? security_file_ioctl+0x94/0xc0 [ 250.403120] ksys_ioctl+0xa9/0xd0 [ 250.406604] __x64_sys_ioctl+0x73/0xb0 [ 250.410549] do_syscall_64+0x1b9/0x820 [ 250.414457] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 250.419836] ? syscall_return_slowpath+0x5e0/0x5e0 [ 250.424781] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 250.425829] binder: 8911:8918 Release 1 refcount change on invalid ref 0 ret -22 [ 250.429771] ? trace_hardirqs_on_caller+0x310/0x310 12:54:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xffffff7f00000000) 12:54:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x0, &(0x7f00009ff000)=ANY=[@ANYBLOB], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 250.429790] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 250.429812] ? prepare_exit_to_usermode+0x291/0x3b0 [ 250.452443] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 250.457317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 250.462530] RIP: 0033:0x457387 [ 250.465751] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 250.484039] binder_alloc: binder_alloc_mmap_handler: 8911 20001000-20004000 already mapped failed -16 12:54:53 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xbff, 0x800) getpeername$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getcwd(&(0x7f0000000280)=""/210, 0x283) 12:54:53 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x20900, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x800000000000000) [ 250.484681] RSP: 002b:00007f83c6b33a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 250.484697] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000457387 [ 250.484714] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 250.501877] binder: BINDER_SET_CONTEXT_MGR already set [ 250.509094] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 250.509102] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 250.509110] R13: 0000000000000001 R14: 00000000004d7d28 R15: 0000000000000003 [ 250.573713] binder: 8911:8918 ioctl 40046207 0 returned -16 [ 250.579706] binder_alloc: 8911: binder_alloc_buf, no vma [ 250.579754] binder: send failed reply for transaction 2 to 8911:8918 [ 250.586236] binder: 8911:8924 transaction failed 29189/-3, size 24-8 line 2973 [ 250.594795] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:54:53 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000640)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x44, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="00634040000000000000000000000000000000000000000000000000000000000000000018000000000000000800000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB="852a627300000000", @ANYRES64=0x0, @ANYBLOB="090000000800000026eb700ee421dc24b8"], @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, &(0x7f00000003c0)}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000380)={0x8, 0x0, &(0x7f0000000500)=[@release], 0x0, 0x0, &(0x7f0000000400)}) 12:54:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x0, &(0x7f00009ff000)=ANY=[@ANYBLOB], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 250.641585] binder: undelivered TRANSACTION_ERROR: 29189 [ 250.661954] EXT4-fs (loop2): invalid inodes per group: 16384 [ 250.661954] [ 250.681691] binder: undelivered TRANSACTION_COMPLETE 12:54:53 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x20900, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@mcast1, @in6=@local}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000002680)=0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x800000000000000) [ 250.718336] binder: undelivered TRANSACTION_ERROR: 29189 [ 250.718865] binder: 8935:8936 Release 1 refcount change on invalid ref 0 ret -22 12:54:53 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 250.818183] Dead loop on virtual device ip6_vti0, fix it urgently! 12:54:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x0, &(0x7f00009ff000)=ANY=[@ANYBLOB], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 250.886800] FAULT_INJECTION: forcing a failure. [ 250.886800] name failslab, interval 1, probability 0, space 0, times 0 [ 250.902769] Dead loop on virtual device ip6_vti0, fix it urgently! [ 250.914385] Dead loop on virtual device ip6_vti0, fix it urgently! [ 250.949120] CPU: 0 PID: 8948 Comm: syz-executor2 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 250.957600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 250.967090] Call Trace: [ 250.969721] dump_stack+0x244/0x3ab [ 250.973487] ? dump_stack_print_info.cold.2+0x52/0x52 [ 250.978707] ? radix_tree_tag_set+0x3d0/0x3d0 [ 250.983252] should_fail.cold.4+0xa/0x17 [ 250.985594] binder: release 8935:8936 transaction 7 out, still active [ 250.987336] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 250.987353] ? __save_stack_trace+0x8d/0xf0 [ 250.987373] ? lock_acquire+0x1ed/0x520 [ 251.006475] Dead loop on virtual device ip6_vti0, fix it urgently! [ 251.007397] ? kernfs_activate+0x8e/0x2c0 [ 251.007426] ? lock_release+0xa10/0xa10 [ 251.018708] binder: unexpected work type, 4, not freed [ 251.021972] ? perf_trace_sched_process_exec+0x860/0x860 [ 251.021998] ? fs_reclaim_acquire+0x20/0x20 [ 251.022012] ? lock_downgrade+0x900/0x900 [ 251.022027] ? perf_trace_sched_process_exec+0x860/0x860 [ 251.022050] __should_failslab+0x124/0x180 [ 251.039395] binder: undelivered TRANSACTION_COMPLETE [ 251.041289] should_failslab+0x9/0x14 [ 251.041306] kmem_cache_alloc+0x2be/0x730 [ 251.041320] ? kasan_check_read+0x11/0x20 [ 251.041336] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 251.041356] __kernfs_new_node+0x127/0x8d0 [ 251.050783] binder: send failed reply for transaction 7, target dead [ 251.051088] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 251.088800] ? kasan_check_write+0x14/0x20 [ 251.093145] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 251.098098] ? __kernfs_new_node+0x697/0x8d0 [ 251.102529] ? wait_for_completion+0x8a0/0x8a0 [ 251.107137] ? kasan_check_write+0x14/0x20 [ 251.111394] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 251.116346] ? _raw_spin_unlock_irq+0x60/0x80 [ 251.120869] ? __schedule+0x168b/0x21d0 [ 251.124875] ? wait_for_completion+0x8a0/0x8a0 [ 251.129584] ? mutex_unlock+0xd/0x10 [ 251.133355] ? kernfs_activate+0x21a/0x2c0 [ 251.137649] kernfs_new_node+0x95/0x120 [ 251.141694] __kernfs_create_file+0x5a/0x340 [ 251.146139] sysfs_add_file_mode_ns+0x222/0x530 [ 251.150850] internal_create_group+0x3df/0xd80 [ 251.155464] ? remove_files.isra.1+0x190/0x190 [ 251.160072] ? up_write+0x7b/0x220 [ 251.163669] ? down_write_nested+0x130/0x130 [ 251.168167] ? down_read+0x120/0x120 [ 251.171913] sysfs_create_group+0x1f/0x30 [ 251.176100] lo_ioctl+0x1307/0x1d60 [ 251.179751] ? lo_rw_aio+0x1ef0/0x1ef0 [ 251.183681] blkdev_ioctl+0x9ac/0x2010 [ 251.187586] ? blkpg_ioctl+0xc10/0xc10 [ 251.191519] ? lock_downgrade+0x900/0x900 [ 251.195692] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 251.200670] ? save_stack+0x43/0xd0 [ 251.204315] ? __kasan_slab_free+0x102/0x150 [ 251.208745] ? __fget+0x4d1/0x740 [ 251.212398] ? ksys_dup3+0x680/0x680 [ 251.216141] block_ioctl+0xee/0x130 [ 251.219788] ? blkdev_fallocate+0x400/0x400 [ 251.224128] do_vfs_ioctl+0x1de/0x1720 [ 251.228101] ? trace_hardirqs_on+0xbd/0x310 [ 251.232507] ? ioctl_preallocate+0x300/0x300 [ 251.236938] ? __fget_light+0x2e9/0x430 [ 251.240927] ? fget_raw+0x20/0x20 [ 251.244398] ? putname+0xf2/0x130 [ 251.247871] ? kmem_cache_free+0x21a/0x290 [ 251.252122] ? putname+0xf7/0x130 [ 251.255589] ? do_sys_open+0x3ac/0x700 [ 251.259524] ? security_file_ioctl+0x94/0xc0 [ 251.263947] ksys_ioctl+0xa9/0xd0 [ 251.267418] __x64_sys_ioctl+0x73/0xb0 [ 251.271322] do_syscall_64+0x1b9/0x820 [ 251.275227] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 251.280610] ? syscall_return_slowpath+0x5e0/0x5e0 [ 251.285590] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 251.290474] ? trace_hardirqs_on_caller+0x310/0x310 [ 251.295575] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 251.300609] ? prepare_exit_to_usermode+0x291/0x3b0 [ 251.305696] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 251.310564] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 251.315770] RIP: 0033:0x457387 [ 251.318982] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 251.337904] RSP: 002b:00007f83c6b33a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 251.345670] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000457387 [ 251.352958] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 251.360245] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 251.367532] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 251.374824] R13: 0000000000000001 R14: 00000000004d7d28 R15: 0000000000000003 12:54:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x800e01000000) 12:54:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e20, 0x9ac6, @mcast2, 0x3}, {0xa, 0x4e20, 0x5, @mcast1, 0x3}, 0x3, [0xeb7c, 0xfffffffffffffff8, 0xf82, 0xd87, 0x5, 0x2, 0x6, 0x200]}, 0x5c) 12:54:54 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000240)="fd6ffe") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000820}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001833455fc34bb223850f1e6093b8677b", @ANYRES16=r2, @ANYBLOB="01002dbd7000ffdb0007000000000000000000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) [ 251.395996] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 251.412943] EXT4-fs (loop2): invalid inodes per group: 16384 [ 251.412943] 12:54:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x1, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x3, 0x12, 0x3b, 0x8000000007f, 0x1, 0xffffffffffffffff, 0x80}, 0x58) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) 12:54:54 executing program 2 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000006000/0x3000)=nil, 0x3000) r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x13a) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x10001, 0x4, 0x5, 0x0, 0x9, 0x1ff, 0x2, {0x0, @in6={{0xa, 0x4e22, 0x6, @ipv4={[], [], @remote}, 0x8}}, 0x24000000000000, 0x1f, 0x100000000, 0x1, 0xc5}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)={r2, 0xcc, "41e93bf29ec2789353d98d383abd2ac0560d200f25b59bd9c23f53e36fd0f26d6e53b4656e6ae5a10405ef165589efb65365e2450a5f3df18f130e73b461f82bda5a67d6ce247aa7b8ed5618ff2b7112e424a6565a69e27243d4bf3ba84e26557160620f16b03bd27b6cc9a15a872943ad5804c42e577729f054256f3b341fee02e1eae020b5eaef20ed13a43408627407e7d691d316843226d9fe50b80ec990e5954cf45748f0ad63a7228025e62b9ed1c35c8a378cfd015bf48257d813dbfece8683ebedcc57379a014508"}, &(0x7f0000000180)=0xd4) set_thread_area(&(0x7f0000000600)={0x0, 0x0, 0x0, 0xa1d, 0x7f, 0x0, 0x8001, 0x1, 0x3, 0x6}) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in6=@mcast1}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xb3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000001c0)={0x7, 0xffff, 0x0, 0x7, 0x3be01b6b, 0xffff}) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000140)=@add_del={0x2, &(0x7f0000000100)='gre0\x00', 0x1}) 12:54:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x1, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:54 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ftruncate(r0, 0x1000) lseek(r0, 0x200, 0x2) r1 = open(&(0x7f0000000240)='./bus\x00', 0x408000, 0x2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000000)="f9a94a0d08fece710109541419c90216c875b3a038b9480a7dc0fbdc98de39c63c322df6c1", &(0x7f0000000040)="d80c40503181f59955c5ecff5509b2eeac63c7951ee44608056f86d19b161e10548cf12a31f52f19f2a44422ca79531a4bad9fad1fe7ace7fc4681dc8979aaffd72f01b76c8f0bb545852e791149", 0x1}, 0x20) sendfile(r0, r1, &(0x7f0000d83ff8), 0xb3af) [ 251.660384] FAULT_INJECTION: forcing a failure. [ 251.660384] name failslab, interval 1, probability 0, space 0, times 0 [ 251.689212] EXT4-fs warning (device sda1): verify_group_input:105: Cannot add at group 7 (only 16 groups) [ 251.701405] CPU: 1 PID: 8981 Comm: syz-executor2 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 251.709930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.719306] Call Trace: [ 251.721920] dump_stack+0x244/0x3ab [ 251.721954] ? dump_stack_print_info.cold.2+0x52/0x52 [ 251.730785] should_fail.cold.4+0xa/0x17 [ 251.734872] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 251.740009] ? lock_release+0xa10/0xa10 [ 251.744012] ? perf_trace_sched_process_exec+0x860/0x860 [ 251.749662] ? __mutex_lock+0x85e/0x16f0 [ 251.753753] ? node_tag_clear+0xc2/0x1c0 [ 251.757842] ? kernfs_activate+0x8e/0x2c0 [ 251.762024] ? fs_reclaim_acquire+0x20/0x20 [ 251.766369] ? lock_downgrade+0x900/0x900 [ 251.770698] ? __mutex_lock+0x85e/0x16f0 [ 251.774791] ? perf_trace_sched_process_exec+0x860/0x860 [ 251.780264] ? kernfs_activate+0x21a/0x2c0 [ 251.784529] __should_failslab+0x124/0x180 [ 251.788790] should_failslab+0x9/0x14 [ 251.792645] kmem_cache_alloc+0x2be/0x730 [ 251.796822] ? lock_downgrade+0x900/0x900 [ 251.800996] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 251.806124] __kernfs_new_node+0x127/0x8d0 [ 251.810393] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 251.815176] ? kasan_check_write+0x14/0x20 [ 251.819439] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 251.824391] ? wait_for_completion+0x8a0/0x8a0 [ 251.828999] ? wait_for_completion+0x8a0/0x8a0 [ 251.833610] ? kasan_check_write+0x14/0x20 [ 251.837905] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 251.842853] ? mutex_unlock+0xd/0x10 [ 251.846570] ? kernfs_activate+0x21a/0x2c0 [ 251.850864] ? kernfs_walk_and_get_ns+0x340/0x340 [ 251.855718] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 251.861264] ? kernfs_link_sibling+0x1d2/0x3b0 [ 251.866053] kernfs_new_node+0x95/0x120 [ 251.870030] __kernfs_create_file+0x5a/0x340 [ 251.874498] sysfs_add_file_mode_ns+0x222/0x530 [ 251.879175] internal_create_group+0x3df/0xd80 [ 251.883817] ? remove_files.isra.1+0x190/0x190 [ 251.888401] ? up_write+0x7b/0x220 [ 251.892020] ? down_write_nested+0x130/0x130 [ 251.896443] ? down_read+0x120/0x120 [ 251.900180] sysfs_create_group+0x1f/0x30 [ 251.904470] lo_ioctl+0x1307/0x1d60 [ 251.908096] ? lo_rw_aio+0x1ef0/0x1ef0 [ 251.911983] blkdev_ioctl+0x9ac/0x2010 [ 251.915868] ? blkpg_ioctl+0xc10/0xc10 [ 251.919766] ? lock_downgrade+0x900/0x900 [ 251.923935] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 251.928869] ? save_stack+0x43/0xd0 [ 251.932500] ? __kasan_slab_free+0x102/0x150 [ 251.936979] ? __fget+0x4d1/0x740 [ 251.940435] ? ksys_dup3+0x680/0x680 [ 251.944165] block_ioctl+0xee/0x130 [ 251.947976] ? blkdev_fallocate+0x400/0x400 [ 251.952298] do_vfs_ioctl+0x1de/0x1720 [ 251.956189] ? trace_hardirqs_on+0xbd/0x310 [ 251.960774] ? ioctl_preallocate+0x300/0x300 [ 251.965183] ? __fget_light+0x2e9/0x430 [ 251.969230] ? fget_raw+0x20/0x20 [ 251.972689] ? putname+0xf2/0x130 [ 251.976262] ? kmem_cache_free+0x21a/0x290 [ 251.980726] ? putname+0xf7/0x130 [ 251.984183] ? do_sys_open+0x3ac/0x700 [ 251.988073] ? security_file_ioctl+0x94/0xc0 [ 251.992495] ksys_ioctl+0xa9/0xd0 [ 251.995980] __x64_sys_ioctl+0x73/0xb0 [ 251.999884] do_syscall_64+0x1b9/0x820 [ 252.003769] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 252.009136] ? syscall_return_slowpath+0x5e0/0x5e0 [ 252.014071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 252.018914] ? trace_hardirqs_on_caller+0x310/0x310 [ 252.023938] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 252.028956] ? prepare_exit_to_usermode+0x291/0x3b0 [ 252.033990] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 252.038850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.044040] RIP: 0033:0x457387 [ 252.047231] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.066132] RSP: 002b:00007f83c6b33a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 252.073906] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000457387 [ 252.081181] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 252.088508] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 252.095897] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 252.103313] R13: 0000000000000001 R14: 00000000004d7d28 R15: 0000000000000003 12:54:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x1, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:55 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x3, 0x80000000000009, 0x7}, 0x2c) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7f, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x1, 0x309082) socketpair(0x15, 0x4, 0x9, &(0x7f00000001c0)) syz_open_dev$rtc(&(0x7f0000000200)='/dev/rtc#\x00', 0x3, 0x1030c0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$RTC_UIE_OFF(r2, 0x7004) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000240), 0xffffffffffffffff}, 0x20) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x4080) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) fcntl$setlease(r0, 0x400, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) 12:54:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xff5f110000000000) [ 252.165850] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 252.166543] EXT4-fs warning (device sda1): verify_group_input:105: Cannot add at group 7 (only 16 groups) [ 252.183670] EXT4-fs (loop2): invalid inodes per group: 16384 [ 252.183670] 12:54:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x61c1, 0x402100) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_emit_ethernet(0x6a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500ad80521e1fbe0b329f4d52f6577208005c0000000000019078ac1414bb2486141105049078000000004000000000000000002b0000082c00000000000000000000e000000200000000e000000100000000000000007fc22b0100000000000000002e86860e4bb88bb9ebc80259115ff20b61194fe262c3bbb98ff880fe1bf200de797962a7a2013c0e2d54fffa016ee90000000000000000c4bc2b115c07faeb6723e8d90d781f78c1f8a2e68f141609e523f6ad7ac00c5b97afc47a295e7a1a4a0f8460ba8d1fc9a9d7fa9387a340c75339fb28cb2a0eded168dea2f143642cd6989e1e596a4bf96e4c1a794e34a1bf5002e3e71ec848ad9d2aa993674f807eb18c70d6a2bdf466fdd8739c726983de1765c89066b832ef3724a66d7992688902c36a6ff407e4825967f7d5aed2730643e94fc1bfe5bc4cef9d9b90"], &(0x7f0000000140)) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000000c0)}) 12:54:55 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='bond_slave_1\x00') unshare(0x400) getsockopt$inet6_buf(r1, 0x29, 0x24, &(0x7f0000000100)=""/66, &(0x7f0000000240)=0x42) 12:54:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x2, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:55 executing program 2 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:55 executing program 1: r0 = gettid() ioprio_set$pid(0x21, r0, 0x8) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xa78f, 0x280602) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x7, 0x4d, 0x2}, 0x7) [ 252.353982] FAULT_INJECTION: forcing a failure. [ 252.353982] name failslab, interval 1, probability 0, space 0, times 0 [ 252.366880] CPU: 0 PID: 9015 Comm: syz-executor2 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 252.375320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.384704] Call Trace: [ 252.387330] dump_stack+0x244/0x3ab [ 252.390991] ? dump_stack_print_info.cold.2+0x52/0x52 [ 252.396214] should_fail.cold.4+0xa/0x17 [ 252.400308] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 252.405440] ? lock_release+0xa10/0xa10 [ 252.409436] ? perf_trace_sched_process_exec+0x860/0x860 [ 252.414920] ? __mutex_lock+0x85e/0x16f0 [ 252.419008] ? node_tag_clear+0xc2/0x1c0 [ 252.423103] ? kernfs_activate+0x8e/0x2c0 [ 252.427283] ? fs_reclaim_acquire+0x20/0x20 [ 252.431739] ? lock_downgrade+0x900/0x900 [ 252.435930] ? __mutex_lock+0x85e/0x16f0 [ 252.440017] ? perf_trace_sched_process_exec+0x860/0x860 [ 252.445491] ? kernfs_activate+0x21a/0x2c0 [ 252.449844] __should_failslab+0x124/0x180 [ 252.454108] should_failslab+0x9/0x14 [ 252.457937] kmem_cache_alloc+0x2be/0x730 [ 252.462112] ? lock_downgrade+0x900/0x900 [ 252.466293] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 252.471337] __kernfs_new_node+0x127/0x8d0 [ 252.475747] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 252.480532] ? kasan_check_write+0x14/0x20 [ 252.484812] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 252.489767] ? wait_for_completion+0x8a0/0x8a0 [ 252.494378] ? wait_for_completion+0x8a0/0x8a0 [ 252.498984] ? kasan_check_write+0x14/0x20 [ 252.503243] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 252.508197] ? mutex_unlock+0xd/0x10 [ 252.511937] ? kernfs_activate+0x21a/0x2c0 [ 252.516206] ? kernfs_walk_and_get_ns+0x340/0x340 [ 252.521076] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 252.526675] ? kernfs_link_sibling+0x1d2/0x3b0 [ 252.531377] kernfs_new_node+0x95/0x120 [ 252.535824] __kernfs_create_file+0x5a/0x340 [ 252.540522] sysfs_add_file_mode_ns+0x222/0x530 [ 252.545224] internal_create_group+0x3df/0xd80 [ 252.549839] ? remove_files.isra.1+0x190/0x190 [ 252.554446] ? up_write+0x7b/0x220 [ 252.558073] ? down_write_nested+0x130/0x130 [ 252.562505] ? down_read+0x120/0x120 [ 252.566248] sysfs_create_group+0x1f/0x30 [ 252.570430] lo_ioctl+0x1307/0x1d60 [ 252.574075] ? lo_rw_aio+0x1ef0/0x1ef0 [ 252.574088] blkdev_ioctl+0x9ac/0x2010 [ 252.574100] ? blkpg_ioctl+0xc10/0xc10 [ 252.574113] ? lock_downgrade+0x900/0x900 [ 252.574132] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 252.574149] ? save_stack+0x43/0xd0 [ 252.574173] ? __kasan_slab_free+0x102/0x150 [ 252.603085] ? __fget+0x4d1/0x740 [ 252.606563] ? ksys_dup3+0x680/0x680 [ 252.606588] block_ioctl+0xee/0x130 [ 252.606610] ? blkdev_fallocate+0x400/0x400 [ 252.618334] do_vfs_ioctl+0x1de/0x1720 [ 252.622250] ? trace_hardirqs_on+0xbd/0x310 [ 252.626737] ? ioctl_preallocate+0x300/0x300 [ 252.631171] ? __fget_light+0x2e9/0x430 [ 252.635168] ? fget_raw+0x20/0x20 [ 252.635183] ? putname+0xf2/0x130 [ 252.635201] ? kmem_cache_free+0x21a/0x290 [ 252.635216] ? putname+0xf7/0x130 [ 252.635234] ? do_sys_open+0x3ac/0x700 [ 252.646401] ? security_file_ioctl+0x94/0xc0 [ 252.646420] ksys_ioctl+0xa9/0xd0 [ 252.646443] __x64_sys_ioctl+0x73/0xb0 [ 252.658368] do_syscall_64+0x1b9/0x820 [ 252.658386] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 252.658403] ? syscall_return_slowpath+0x5e0/0x5e0 [ 252.658418] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 252.658438] ? trace_hardirqs_on_caller+0x310/0x310 [ 252.684866] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 252.695069] ? prepare_exit_to_usermode+0x291/0x3b0 [ 252.700115] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:54:55 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f0000bfcffc), &(0x7f0000d12ffc)=0x4) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000040)=0xc88) 12:54:55 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x240482, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x12}) 12:54:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200), 0x0) semget(0xffffffffffffffff, 0x3, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent)\x00'}, 0x58) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000040)=[{}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r2, 0xc0086423, &(0x7f00000001c0)={r3, 0x2}) 12:54:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xffd71000) 12:54:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x2, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 252.705064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.710279] RIP: 0033:0x457387 [ 252.710296] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.710305] RSP: 002b:00007f83c6b33a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 252.710335] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000457387 [ 252.740191] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:54:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x2, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 252.740200] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 252.740209] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 252.740218] R13: 0000000000000001 R14: 00000000004d7d28 R15: 0000000000000003 12:54:55 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000140)={0xbe, 0xffff, 0x101}) socket$inet6(0xa, 0x6, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(0xffffffffffffffff, 0x10d, 0x0, &(0x7f00001c9fff), 0x0) r2 = socket(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000080), &(0x7f0000000180)=0x4) sendmsg$nl_route(r2, &(0x7f0000000740)={&(0x7f00000001c0), 0xc, &(0x7f0000000700)={&(0x7f0000002400)=@bridge_getneigh={0x28, 0x1e, 0x601, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0xd}]}, 0x28}}, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000440)='./file0\x00', 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) fcntl$lock(r0, 0x0, &(0x7f0000000280)={0x2, 0x3, 0xad, 0x4, r3}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000400)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000380)={&(0x7f0000000100)='./file0\x00'}, 0x10) 12:54:55 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x94002, 0x0) ioctl$int_in(r0, 0x800000c4045005, &(0x7f0000000080)=0x100040000) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x30, 0x0, &(0x7f0000000100)=[@increfs_done={0x40106308, r1, 0x2}, @enter_looper, @free_buffer={0x40086303, r2}, @increfs={0x40046304, 0x4}, @exit_looper], 0x58, 0x0, &(0x7f0000000140)="0d1f5998839d0755a274f0ff1c64b98de3ba7c7f805591370f86af573c4c3e7e849f6fccb3227152651beab676b41a6b4df7ffd93df95807162a3c4a08274371d4b6989914811b5a78a33b0ab332d78f0692d1112a1fa0e5"}) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) 12:54:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200), 0x0) semget(0xffffffffffffffff, 0x3, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent)\x00'}, 0x58) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000040)=[{}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r2, 0xc0086423, &(0x7f00000001c0)={r3, 0x2}) [ 252.802592] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 252.811183] EXT4-fs (loop2): invalid inodes per group: 16384 [ 252.811183] 12:54:55 executing program 2 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x580000) 12:54:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x2, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:56 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=',lowerdir=.:file0,workdir=.']) r0 = epoll_create1(0x80000) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) splice(r0, &(0x7f0000000080), r1, &(0x7f00000000c0), 0x5, 0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x101000, 0x0) fdatasync(r2) [ 252.960083] FAULT_INJECTION: forcing a failure. [ 252.960083] name failslab, interval 1, probability 0, space 0, times 0 [ 252.972692] CPU: 0 PID: 9071 Comm: syz-executor2 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 252.981133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.990516] Call Trace: [ 252.993143] dump_stack+0x244/0x3ab [ 252.996806] ? dump_stack_print_info.cold.2+0x52/0x52 [ 253.002035] should_fail.cold.4+0xa/0x17 12:54:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x2, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 253.006132] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 253.011270] ? lock_release+0xa10/0xa10 [ 253.012094] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 253.015264] ? perf_trace_sched_process_exec+0x860/0x860 [ 253.015295] ? __mutex_lock+0x85e/0x16f0 [ 253.015315] ? node_tag_clear+0xc2/0x1c0 [ 253.036549] ? kernfs_activate+0x8e/0x2c0 [ 253.040730] ? fs_reclaim_acquire+0x20/0x20 [ 253.045079] ? lock_downgrade+0x900/0x900 [ 253.049263] ? __mutex_lock+0x85e/0x16f0 [ 253.053353] ? perf_trace_sched_process_exec+0x860/0x860 [ 253.058832] ? kernfs_activate+0x21a/0x2c0 [ 253.063097] __should_failslab+0x124/0x180 [ 253.067530] should_failslab+0x9/0x14 [ 253.071363] kmem_cache_alloc+0x2be/0x730 [ 253.072674] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 253.075531] ? lock_downgrade+0x900/0x900 [ 253.075550] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 253.075574] __kernfs_new_node+0x127/0x8d0 [ 253.096664] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 253.101445] ? kasan_check_write+0x14/0x20 [ 253.105713] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 253.110695] ? wait_for_completion+0x8a0/0x8a0 [ 253.115311] ? wait_for_completion+0x8a0/0x8a0 [ 253.119926] ? kasan_check_write+0x14/0x20 [ 253.124188] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 253.129153] ? mutex_unlock+0xd/0x10 [ 253.132900] ? kernfs_activate+0x21a/0x2c0 [ 253.137172] ? kernfs_walk_and_get_ns+0x340/0x340 [ 253.142049] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 253.147612] ? kernfs_link_sibling+0x1d2/0x3b0 [ 253.152258] kernfs_new_node+0x95/0x120 [ 253.156271] __kernfs_create_file+0x5a/0x340 12:54:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1000000000002, 0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x4000000000000000, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xd, r1) r2 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2002) getuid() lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000440)='./file0\x00', r3, r4) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000580)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setown(r5, 0x8, r0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)="2e2f6367726f75702e6370752f73797a31fe", 0x1ff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x4, 0x20}, &(0x7f0000000200)=0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\'', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000003c0), 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x8100, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x3, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) r7 = mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x12, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000140)={r7}) eventfd2(0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)) 12:54:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x2, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 253.160719] sysfs_add_file_mode_ns+0x222/0x530 [ 253.165427] internal_create_group+0x3df/0xd80 [ 253.170136] ? remove_files.isra.1+0x190/0x190 [ 253.174755] ? up_write+0x7b/0x220 [ 253.178430] ? down_write_nested+0x130/0x130 [ 253.182865] ? down_read+0x120/0x120 [ 253.186662] sysfs_create_group+0x1f/0x30 [ 253.190845] lo_ioctl+0x1307/0x1d60 [ 253.194498] ? lo_rw_aio+0x1ef0/0x1ef0 [ 253.198499] blkdev_ioctl+0x9ac/0x2010 [ 253.202416] ? blkpg_ioctl+0xc10/0xc10 [ 253.206331] ? lock_downgrade+0x900/0x900 12:54:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x2, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003000000000000000000008195000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 253.210510] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 253.215474] ? save_stack+0x43/0xd0 [ 253.219122] ? __kasan_slab_free+0x102/0x150 [ 253.223562] ? __fget+0x4d1/0x740 [ 253.227051] ? ksys_dup3+0x680/0x680 [ 253.230796] block_ioctl+0xee/0x130 [ 253.234447] ? blkdev_fallocate+0x400/0x400 [ 253.238790] do_vfs_ioctl+0x1de/0x1720 [ 253.242704] ? trace_hardirqs_on+0xbd/0x310 [ 253.247051] ? ioctl_preallocate+0x300/0x300 [ 253.251486] ? __fget_light+0x2e9/0x430 [ 253.251500] ? fget_raw+0x20/0x20 [ 253.251513] ? putname+0xf2/0x130 [ 253.251527] ? kmem_cache_free+0x21a/0x290 [ 253.251539] ? putname+0xf7/0x130 [ 253.251553] ? do_sys_open+0x3ac/0x700 [ 253.251570] ? security_file_ioctl+0x94/0xc0 [ 253.251589] ksys_ioctl+0xa9/0xd0 [ 253.266786] __x64_sys_ioctl+0x73/0xb0 [ 253.286019] do_syscall_64+0x1b9/0x820 [ 253.289935] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 253.295332] ? syscall_return_slowpath+0x5e0/0x5e0 [ 253.300286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 253.305163] ? trace_hardirqs_on_caller+0x310/0x310 12:54:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xc) [ 253.310211] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 253.315247] ? prepare_exit_to_usermode+0x291/0x3b0 [ 253.320287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 253.325261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.330558] RIP: 0033:0x457387 [ 253.333784] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.352784] RSP: 002b:00007f83c6b33a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 253.352800] RAX: ffffffffffffffda RBX: 0000000020000028 RCX: 0000000000457387 [ 253.352807] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 253.352814] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 253.352821] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 253.352828] R13: 0000000000000001 R14: 00000000004d7d28 R15: 0000000000000003 12:54:56 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xe8) getegid() fcntl$getownex(r3, 0x10, &(0x7f0000004880)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000004a40)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000003c0)='./file0\x00', 0xffffffff7ffffffc) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r6, 0x7003, &(0x7f00000000c0)) preadv(r6, &(0x7f0000000200)=[{&(0x7f0000000180)=""/116, 0x74}], 0x1, 0x100000000000000) close(r6) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="c8d4282428d27493a4bec81985966a256181769f02b0d4807321827ddcfc1985050a2476d7000000000000"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") ftruncate(r5, 0x0) write$FUSE_NOTIFY_POLL(r6, &(0x7f0000000400)={0x18}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 12:54:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200), 0x0) semget(0xffffffffffffffff, 0x3, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent)\x00'}, 0x58) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x4, &(0x7f0000000040)=[{}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r2, 0xc0086423, &(0x7f00000001c0)={r3, 0x2}) [ 253.443439] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:54:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x2, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003000000000000000000008195000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 253.485068] EXT4-fs (loop2): invalid inodes per group: 16384 [ 253.485068] 12:54:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000080)=0xfffffffffffffffc, 0xfffffffffffffd46) 12:54:56 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x2, &(0x7f00009ff000)=ANY=[@ANYBLOB="1800000003000000000000000000008195000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x7f000) 12:54:56 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xe8) getegid() fcntl$getownex(r3, 0x10, &(0x7f0000004880)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000004a40)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000003c0)='./file0\x00', 0xffffffff7ffffffc) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r6, 0x7003, &(0x7f00000000c0)) preadv(r6, &(0x7f0000000200)=[{&(0x7f0000000180)=""/116, 0x74}], 0x1, 0x100000000000000) close(r6) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="c8d4282428d27493a4bec81985966a256181769f02b0d4807321827ddcfc1985050a2476d7000000000000"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") ftruncate(r5, 0x0) write$FUSE_NOTIFY_POLL(r6, &(0x7f0000000400)={0x18}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) [ 253.929695] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 253.954372] EXT4-fs (loop2): invalid inodes per group: 16384 [ 253.954372] 12:54:57 executing program 3: syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x40, 0x101000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000000)={0x15, 0xfe, &(0x7f0000000240)="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"}) preadv(r0, &(0x7f0000000480), 0x1000000000000138, 0x0) 12:54:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x0, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x10ffff) 12:54:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/qat_adf_ctl\x00', 0x90000, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000008c0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000880)={&(0x7f00000003c0)=ANY=[@ANYRESOCT], 0x1}}, 0x0) semop(0x0, &(0x7f0000000200), 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14, 0x800) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xb, 0x2, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x20, 0x3, 0x0, 0x1, 0x50}], &(0x7f00000000c0)='syzkaller\x00', 0xd8ca, 0xe4, &(0x7f00000001c0)=""/228, 0x41000, 0x1, [], r1, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r3, &(0x7f0000000700), 0x10000000000000ea) io_setup(0x3ff, &(0x7f0000000100)=0x0) io_submit(r4, 0x0, &(0x7f00000002c0)) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000400)=""/116) 12:54:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='\nxt2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x0, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x0, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 254.365949] syz-executor1 (9161) used greatest stack depth: 15064 bytes left [ 254.382320] syz-executor1 (9152) used greatest stack depth: 9896 bytes left 12:54:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x10c7ff) 12:54:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='%xt2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000000100), 0xc, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000000301ffff808f00003d88c83f00b516ba"], 0x14}}, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x410c80, 0x0) r2 = fcntl$getown(r0, 0x9) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getpeername$unix(r1, &(0x7f0000000600), &(0x7f0000000680)=0x6e) lchown(&(0x7f0000000b00)='./file0\x00', r3, r4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="104b51b810995113ccc5b6a1fea18e4a", 0x10) sendmmsg$unix(r1, &(0x7f0000000a80)=[{&(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000580)=[{&(0x7f00000001c0)="034a8dc64d0877b643ca946346def64ee58846c0c0b18cad8b818dc0f84b2be81868d167a6b345df1eb6d4e8afe09c25c862c8778c335c3d1bdc70e26bd54924d98ad7b3b46932f43b278d5f23f08c47b9a0151fd70ed957c695c351ff6c03e3d793c4abf16adf0cf0bc0b92bf1c0e4331779c678dc47ab6d10741e8312cb48b10b11aec16eefcee7d6f5f959c021ffa0b3868f46750f24d9df760fe79ade17ef2a971d1f6d92fcedc1b095ded56f492261b99ff0a218ce6af743bdba2dc4187dade028c55981084ad6aa04ee48b3b0566", 0xd1}, {&(0x7f00000002c0)="d7da8d821168d6570273edf497f4f4eee4ddf67aa8844cf3bb7755d0969a8b5c920318170c1fe61234982d50e25eb90aad7cf847bbaa8696f8fcef2e706e4de27368c7824eb579fef3d74b333af679c40473fc4322bc9b748f757438ab64c32dcc74fe4bb6df6ccf13670d8c489227d2", 0x70}, {&(0x7f0000000380)="b76e3a38a568dffe1c80ed3cb51ed598d579fde521d8ea38f86629c34a485b653769daa05d6a97860cdffb53a406e3f2a4165383d1d7ca7f0b77fc2414c70875ac109ce5bed0778ccd26207c0738966a09577c4b57c686089bd32ce9eb22205381b37d8d5630c6bece80b7e8999d9ad5de6e77ae956a5c5cb11ba9c805e90783424c0e998bdc593e6e682be28a0d59573c5fe534d2b9d6559e534a919355775d5be95245a19e3f868673bf", 0xab}, {&(0x7f0000000440)="1ff7c5f39ac8ddcd46fd6bac1fc344dd9ed69172442a0a1563635151702f0463cdc205b17af1058c0b47061a6450789da6be3913f48fbab25f0441bb9c841a39e6a637a7bbee41112c", 0xffffffffffffffb2}, {&(0x7f00000004c0)="285a3795f0ecf6d94e774991021d4f98183936b25fb10bc5da7f05ac1ab001670db389be968cdca00e602bffcf391e80ade983fcd409f1b8f69a98a995809f75b162f9574bc2115aea3c32b274f0476e4074b14724459189817f51931a9b6558fdd430716a8aa631e4db6e4753cdc13ce94cc1fafb781a1776ce8cc333a996624463d9037da6c69a79096db1799f8d29b71056c963bd554a8ef7cab791e54e1f8317f8790a47d5acbf7bd1d5d8d161d7bb3ff9e348c5", 0xb6}], 0x5, &(0x7f00000007c0)=[@rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x10}, @cred={0x20, 0x1, 0x2, r2, 0x0, r4}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0x98, 0x20000000}, {&(0x7f0000000880)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000900)="f4aea9b867fdce9e4285ec3bae08f915c060abe1be52ffae5122e7b2aaa66cb64c7177019b48216fb4f027f18518da91190c54024a037414fa72edf7f9182bad546b290e1dce2b0338de2f6e569779f1c7b94f9ac00038d9961257eff2dbb3cbc226e73091371b5294b3f3050a4004a31605b459804b34eaff34951d6032e2f4b7d4392449408891b5e869bcf621bc1a1e4be1383085168a4dccd85e3f10cef22f4dc841435e0b6f9c8b4f8fe4149f51f7174157dd74a48dc0a76119", 0xbc}, {&(0x7f00000009c0)="78dfa081850d4e3e31187e2e6a4c575c4a8e9362128f74f4cd4f4b08d6eaacd1959f38fc2725c5536913de0adef5b0b155a42382ace56763f8664c2a9faf861122e68bead1b425c85c104dd488eff555e884d17cf0b6d2a9ed6286638a123f7a3d40ca760f4510a46fde5685b575b057e7a752fd8349a263", 0x78}], 0x2}], 0x2, 0x4000) recvmmsg(r0, &(0x7f00000013c0), 0x1ad, 0x200002, &(0x7f0000000c40)={0x77359400}) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000006c0)={'lo\x00', {0x2, 0x4e21, @multicast1}}) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) 12:54:57 executing program 3: syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x40, 0x101000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000000)={0x15, 0xfe, &(0x7f0000000240)="b865e47274c2248ff62339d3d6c6ce2fc18ecf5afec6a02a6a9fb1d40e7709fe921e4b16a5c01b4b2b74985e3c543e5c153007b3e13cc3645b8e9d9cbb2a2b428af5c25c6dc2e58268cfaea508c28746accb9e18be0154e2c2554902087ebe61b896f68a6629bd780a948601df08fd8d414a48530a03986033c04134a1c3e5220fb4ad004ba393a9a2a9ec1f0ab8f4845bb0b66c51aaded5008cb8aea058ef722f374277d4c46927e0acdea9642ade1c8e921dec41c27ee39b320cbc7fdaa12fff352d3fb3cfd0891481f6bcc3f0418b4474a415d70cfb1f4055a3c3e10a8cf48611c06b1f3a54c13bb1d565c4ebdb47c78c5cebb59f9a363a99e7cbfe5a"}) preadv(r0, &(0x7f0000000480), 0x1000000000000138, 0x0) 12:54:57 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xe8) getegid() fcntl$getownex(r3, 0x10, &(0x7f0000004880)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000004a40)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000003c0)='./file0\x00', 0xffffffff7ffffffc) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r6, 0x7003, &(0x7f00000000c0)) preadv(r6, &(0x7f0000000200)=[{&(0x7f0000000180)=""/116, 0x74}], 0x1, 0x100000000000000) close(r6) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="c8d4282428d27493a4bec81985966a256181769f02b0d4807321827ddcfc1985050a2476d7000000000000"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") ftruncate(r5, 0x0) write$FUSE_NOTIFY_POLL(r6, &(0x7f0000000400)={0x18}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 12:54:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='e\nt2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x800101000000) 12:54:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000200)={r2, 0xf35, 0x2, 0x10000}, 0x10) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:54:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000200)={r2, 0xf35, 0x2, 0x10000}, 0x10) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:54:57 executing program 1: getpgrp(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)) getpgrp(0xffffffffffffffff) getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) getpgid(0x0) r0 = getpgid(0xffffffffffffffff) r1 = getpgrp(r0) getpriority(0x2, r1) r2 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x9c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000040)={{0x7, 0x2}, 'port0\x00', 0x2, 0x40000, 0xdba, 0xfffffffffffffffa, 0x4, 0x2, 0x0, 0x0, 0x1, 0x80}) 12:54:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='e%t2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:58 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./bus\x00', 0x101400, 0x40) readahead(r0, 0x5, 0x8001) mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps_rollup\x00') r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000180), 0x10013c93e) 12:54:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000200)={r2, 0xf35, 0x2, 0x10000}, 0x10) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:54:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xa00) [ 255.142567] audit: type=1804 audit(1539262498.206:34): pid=9244 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir569537974/syzkaller.5Ml5dW/65/bus" dev="sda1" ino=16532 res=1 [ 255.198836] audit: type=1804 audit(1539262498.236:35): pid=9253 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir569537974/syzkaller.5Ml5dW/65/bus" dev="sda1" ino=16532 res=1 12:54:58 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r3 = socket$kcm(0xa, 0x2, 0x11) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000003f40)={{{@in=@remote, @in=@remote}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@remote}}, &(0x7f0000004040)=0xe8) getegid() fcntl$getownex(r3, 0x10, &(0x7f0000004880)) getresuid(&(0x7f0000004ec0), &(0x7f0000004900), &(0x7f0000004f00)) stat(&(0x7f0000004980)='./file0\x00', &(0x7f00000049c0)) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000004a40)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000004a80), &(0x7f0000004ac0)=0xc) lstat(&(0x7f0000004b00)='./bus\x00', &(0x7f0000004b40)) sendmmsg$unix(r1, &(0x7f0000004d40)=[{&(0x7f0000004c00)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000004d00)=[{&(0x7f0000004c80)="3b10ef4c4413d16ae8313cd285a0dcdabd2116c0204b72e136c81890770514db5d849e4a2089fab2bd04c715f5a57a6dc2ec07ab8dc45a152a8cbce4990f8ad1545c97dbad81928f", 0x48}], 0x1, 0x0, 0x0, 0x4000000}], 0x1, 0x8000) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000080)}], 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000003c0)='./file0\x00', 0xffffffff7ffffffc) preadv(0xffffffffffffffff, &(0x7f0000000300), 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) recvfrom$inet6(r4, &(0x7f0000000180)=""/150, 0x96, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback, 0x4}, 0xfe72) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext={0x0, 0xfffffffffffffffa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r6, 0x7003, &(0x7f00000000c0)) preadv(r6, &(0x7f0000000200)=[{&(0x7f0000000180)=""/116, 0x74}], 0x1, 0x100000000000000) close(r6) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)="060000000000000000") getpgid(0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="c8d4282428d27493a4bec81985966a256181769f02b0d4807321827ddcfc1985050a2476d7000000000000"], &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") ftruncate(r5, 0x0) write$FUSE_NOTIFY_POLL(r6, &(0x7f0000000400)={0x18}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) rmdir(&(0x7f0000000300)='./file0\x00') write$cgroup_pid(r2, &(0x7f0000000040), 0x12) 12:54:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000200)={r2, 0xf35, 0x2, 0x10000}, 0x10) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:54:58 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:54:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ex\n2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x200700) 12:54:58 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000200)={r2, 0xf35, 0x2, 0x10000}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:54:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ex%2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:58 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000340)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in6=@remote, @in6=@local}, {@in=@broadcast, 0x0, 0x6c}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0x2, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x80000, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffe00, 0x1) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000140)) syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') [ 255.805773] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 255.805773] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 255.805773] [ 255.831542] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:54:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:54:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 255.897164] 9pnet: Could not find request transport: xen 12:54:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:54:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='extP\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 256.027333] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 256.027333] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 256.027333] [ 256.121476] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:54:59 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:54:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x10e800000) 12:54:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x8}, &(0x7f0000000140)=0x8) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:54:59 executing program 4: socketpair(0xb, 0x80805, 0xffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0xf, 0x0, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="d62ae2820002000097"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x5f}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 12:54:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={0xffffffffffffffff, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:59 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:54:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:54:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='extS\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r2, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x10b800000) [ 256.488839] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 256.488839] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 256.488839] [ 256.519895] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:54:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r2, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 256.548553] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 256.548553] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 256.548553] [ 256.587686] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:54:59 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:54:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:54:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="657874cd03", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:54:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f000031aff8)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r2, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000040)) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:54:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x601000000) 12:54:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:54:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:54:59 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000004240)=[{{&(0x7f00000011c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000001240)=""/159, 0x9f}, {&(0x7f0000000140)=""/89, 0x59}, {&(0x7f0000001380)=""/242, 0xf2}, {&(0x7f00000000c0)=""/35, 0x23}, {&(0x7f0000001480)=""/115, 0x73}], 0x5, &(0x7f0000004640)=""/242, 0xf2}}, {{&(0x7f0000002940)=@can, 0x80, &(0x7f0000002ac0)=[{&(0x7f00000029c0)=""/62, 0x3e}, {&(0x7f0000002a00)=""/137, 0x89}], 0x100000000000031b, &(0x7f0000000740)=""/115, 0x73}}, {{&(0x7f0000003fc0)=@nfc_llcp, 0x80, &(0x7f0000004140), 0x0, &(0x7f0000000240)=""/170, 0xaa}}], 0x3, 0x0, &(0x7f00000043c0)={0x0, 0x989680}) sendmmsg(r0, &(0x7f0000004040)=[{{&(0x7f00000001c0)=@l2, 0x80, &(0x7f0000000080)}}], 0x1, 0x0) 12:55:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext\n\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(0xffffffffffffffff, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:00 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000300)="a75c00e527f458f4c5230f6d762b5e24ade4e8de56355ba70abfe308f654555acaa08b92a22499cbe63ad24f89672f909490cf05bdc4d969c042f4db6202b85bb168259d2a0497cb21553730e3caeeab42dcb238e9b2fff70b006aa33104b98a8d60456700a0114da63dfecbf26525909c37372eac0a695a9fc654f9f5f07026c98f819c4bb178d148ba63879f374ac81eed3a4f119f93a854323f804d8a311d3f3a38b2f00f4c6f4097c64b7c0fc013b751f9b296d8ce4e311522db611d7dc07daf52efe81c816a20", 0xc9}, {&(0x7f0000000140)="6db9ab", 0x3}, {&(0x7f0000000400)="a67be40c3b50097e5e3b5edd8ef2335de561d4166a21bb0a2b346259dd4c9546bc82157eeb0d71436995efe6f3e20ee1cc0487c2ea3d6db9c0eda649766ec928e5e60c51850f0b32ad4f3dfa078a933a134918d363c4de891be6c0fe5ebf3527a707d8d83dcdaa5f51dd37d6086cba0ec88844c11938701ac867e79c9f3fe19acf4bedd2a38840aa1523707199f6f224fe1207f05f10c5efc6e32ba8e31261", 0x9f}], 0x3) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1d, &(0x7f0000000040)={@dev, 0x0}, &(0x7f0000000080)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={@ipv4={[], [], @multicast2}, 0x77, r2}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000200)={{0x1, 0x0, 0x0, 0x3}, 0x0, 0x0, 'id0\x00', "74692d65723000000000000000000000020000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000800"}) [ 256.984510] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 256.984510] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 256.984510] [ 257.041860] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:00 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x501000000) 12:55:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(0xffffffffffffffff, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:00 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x601000000) 12:55:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext%\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(0xffffffffffffffff, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040), 0x0, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 257.549133] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:00 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xf4ffffff) 12:55:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040), 0x0, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r1 = accept$packet(r0, &(0x7f0000001300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001340)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001440)={'bridge0\x00'}) r2 = syz_open_dev$sndpcmc(&(0x7f0000001580)='/dev/snd/pcmC#D#c\x00', 0x10001, 0x50000) fsetxattr$security_selinux(r1, &(0x7f0000001240)='security.selinux\x00', &(0x7f0000001280)='system_u:object_r:udev_exec_t:s0\x00', 0x21, 0x3) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f00000015c0)={0x0}, &(0x7f0000001600)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000001680)={r3, 0x10, &(0x7f0000001640)=[@in={0x2, 0x4e20, @loopback}]}, &(0x7f00000016c0)=0x10) r4 = openat$vhci(0xffffffffffffff9c, &(0x7f0000001200)='/dev/vhci\x00', 0x10000, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001480)={'team0\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000200)=""/4096, &(0x7f00000000c0)=0x1000) r5 = accept$alg(r4, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x200000, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vhost-net\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b1840d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000000100)={0x0, 0x6ff3e168, 0x4000}) [ 257.630081] EXT4-fs (loop2): invalid inodes per group: 16384 [ 257.630081] 12:55:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040), 0x0, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 257.705539] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 257.724972] EXT4-fs (loop2): invalid inodes per group: 16384 [ 257.724972] 12:55:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432f4", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xffb71000) 12:55:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480), 0xc, &(0x7f00000000c0)={&(0x7f0000000640)={0x14, 0x18, 0x1, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) 12:55:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:01 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:01 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432fe", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:01 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xd80600) 12:55:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:01 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 258.463060] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 258.523066] EXT4-fs (loop2): invalid inodes per group: 16384 [ 258.523066] 12:55:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 258.576560] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 258.599897] EXT4-fs (loop2): invalid inodes per group: 16384 [ 258.599897] 12:55:01 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:01 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xf80700) 12:55:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:01 executing program 5: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:01 executing program 3 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 258.784847] FAULT_INJECTION: forcing a failure. [ 258.784847] name failslab, interval 1, probability 0, space 0, times 0 [ 258.833300] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 258.880549] CPU: 1 PID: 9628 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 258.889170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.898577] Call Trace: [ 258.901201] dump_stack+0x244/0x3ab [ 258.901230] ? dump_stack_print_info.cold.2+0x52/0x52 [ 258.901262] ? debug_smp_processor_id+0x1c/0x20 [ 258.910208] ? perf_trace_lock+0x14d/0x7a0 [ 258.910229] should_fail.cold.4+0xa/0x17 [ 258.910247] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 258.910262] ? lock_acquire+0x1ed/0x520 [ 258.910278] ? drbg_kcapi_seed+0x2e3/0x1370 [ 258.910297] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.910317] ? lock_is_held_type+0x210/0x210 [ 258.919432] ? lock_downgrade+0x900/0x900 [ 258.919452] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 258.919472] ? refcount_add_not_zero_checked+0x330/0x330 [ 258.919492] ? lock_release+0xa10/0xa10 [ 258.928705] ? lock_is_held_type+0x210/0x210 [ 258.928725] ? fs_reclaim_acquire+0x20/0x20 [ 258.928741] ? lock_downgrade+0x900/0x900 [ 258.928763] ? perf_trace_sched_process_exec+0x860/0x860 [ 258.928779] ? __crypto_alg_lookup+0x31b/0x390 [ 258.928806] __should_failslab+0x124/0x180 [ 258.993939] should_failslab+0x9/0x14 [ 258.997770] __kmalloc+0x2e0/0x760 [ 259.001328] ? crypto_larval_alloc+0x1d0/0x1d0 [ 259.005934] ? __crypto_alloc_tfm+0xd7/0x540 [ 259.010369] __crypto_alloc_tfm+0xd7/0x540 [ 259.014656] crypto_alloc_base+0x122/0x210 [ 259.018915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.024473] drbg_init_sym_kernel+0xa9/0x6f0 [ 259.028902] ? lock_is_held_type+0x210/0x210 [ 259.033330] ? drbg_hash_df+0x800/0x800 [ 259.037329] ? __fget+0x4d1/0x740 [ 259.040803] ? ksys_dup3+0x680/0x680 [ 259.044535] ? drbg_hash_df+0x800/0x800 [ 259.048535] drbg_kcapi_seed+0x72c/0x1370 [ 259.052705] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 259.058265] ? drbg_seed+0x1060/0x1060 [ 259.062180] ? __might_fault+0x12b/0x1e0 [ 259.066262] ? lock_downgrade+0x900/0x900 [ 259.070446] ? lock_acquire+0x1ed/0x520 [ 259.074437] ? lock_release+0xa10/0xa10 [ 259.078425] ? perf_trace_sched_process_exec+0x860/0x860 [ 259.083913] ? usercopy_warn+0x110/0x110 [ 259.087988] ? sock_kmalloc+0x15a/0x1f0 [ 259.091988] crypto_rng_reset+0x7c/0x130 [ 259.096202] rng_setkey+0x25/0x30 [ 259.099695] ? rng_sock_destruct+0x90/0x90 [ 259.103951] alg_setsockopt+0x306/0x3b0 [ 259.107950] __sys_setsockopt+0x1ba/0x3c0 [ 259.112150] ? kernel_accept+0x310/0x310 [ 259.116236] ? ksys_write+0x1ae/0x260 [ 259.120055] ? trace_hardirqs_on+0xbd/0x310 [ 259.124485] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.129982] ? trace_hardirqs_off_caller+0x300/0x300 [ 259.135109] __x64_sys_setsockopt+0xbe/0x150 [ 259.139543] do_syscall_64+0x1b9/0x820 [ 259.143471] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 259.148951] ? syscall_return_slowpath+0x5e0/0x5e0 [ 259.153899] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.158761] ? trace_hardirqs_on_caller+0x310/0x310 [ 259.163797] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 259.168842] ? prepare_exit_to_usermode+0x291/0x3b0 [ 259.173884] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.178747] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.183953] RIP: 0033:0x457519 [ 259.187166] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.206306] RSP: 002b:00007fe451533c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 259.214032] RAX: ffffffffffffffda RBX: 00007fe451533c90 RCX: 0000000000457519 [ 259.221312] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 259.228596] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 259.235970] R10: 0000000020ff8000 R11: 0000000000000246 R12: 00007fe4515346d4 [ 259.243254] R13: 00000000004c39b3 R14: 00000000004d59b8 R15: 0000000000000005 [ 259.255139] EXT4-fs (loop2): invalid inodes per group: 16384 [ 259.255139] [ 259.270479] DRBG: could not allocate cipher TFM handle: aes 12:55:02 executing program 5 (fault-call:8 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:02 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:02 executing program 3 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:02 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 259.410138] FAULT_INJECTION: forcing a failure. [ 259.410138] name failslab, interval 1, probability 0, space 0, times 0 12:55:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x10c800000) [ 259.452973] FAULT_INJECTION: forcing a failure. [ 259.452973] name failslab, interval 1, probability 0, space 0, times 0 [ 259.502453] CPU: 0 PID: 9654 Comm: syz-executor5 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 259.511003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.520382] Call Trace: [ 259.524770] dump_stack+0x244/0x3ab [ 259.528865] ? dump_stack_print_info.cold.2+0x52/0x52 [ 259.534092] should_fail.cold.4+0xa/0x17 [ 259.538179] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.543319] ? mark_held_locks+0x130/0x130 [ 259.547609] ? mark_held_locks+0x130/0x130 [ 259.551911] ? ima_get_action+0x7e/0xa0 [ 259.555918] ? fs_reclaim_acquire+0x20/0x20 [ 259.560439] ? lock_downgrade+0x900/0x900 [ 259.564709] ? mark_held_locks+0x130/0x130 [ 259.568976] ? perf_trace_sched_process_exec+0x860/0x860 [ 259.574450] ? mark_held_locks+0x130/0x130 [ 259.578889] __should_failslab+0x124/0x180 [ 259.583194] should_failslab+0x9/0x14 [ 259.587024] kmem_cache_alloc_node+0x26e/0x730 [ 259.591672] ? mark_held_locks+0x130/0x130 [ 259.595954] __alloc_skb+0x114/0x770 [ 259.599715] ? netdev_alloc_frag+0x1f0/0x1f0 [ 259.604154] ? trace_hardirqs_on+0xbd/0x310 [ 259.608656] ? lock_release+0xa10/0xa10 [ 259.612697] ? lock_sock_nested+0xe2/0x120 [ 259.616958] ? trace_hardirqs_off_caller+0x300/0x300 [ 259.622088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.627682] ? check_preemption_disabled+0x48/0x200 [ 259.632730] ? lock_sock_nested+0x9a/0x120 [ 259.636994] ? lock_sock_nested+0x9a/0x120 [ 259.641259] ? __local_bh_enable_ip+0x160/0x260 [ 259.645965] kcm_sendmsg+0xf69/0x24b0 [ 259.649792] ? perf_trace_sched_process_exec+0x860/0x860 [ 259.655326] ? aa_label_sk_perm+0x91/0x100 [ 259.659588] ? kcm_sendpage+0x1a10/0x1a10 [ 259.663789] ? aa_sk_perm+0x22b/0x8e0 [ 259.667612] ? import_iovec+0x269/0x470 [ 259.671683] ? aa_af_perm+0x5a0/0x5a0 [ 259.675701] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 259.681268] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 259.686232] ? apparmor_socket_sendmsg+0x29/0x30 [ 259.691019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.696581] ? security_socket_sendmsg+0x94/0xc0 [ 259.701360] ? kcm_sendpage+0x1a10/0x1a10 [ 259.705537] sock_sendmsg+0xd5/0x120 [ 259.709356] ___sys_sendmsg+0x7fd/0x930 [ 259.713376] ? copy_msghdr_from_user+0x580/0x580 [ 259.718259] ? lock_downgrade+0x900/0x900 [ 259.722580] ? proc_fail_nth_write+0x9e/0x210 [ 259.727323] ? __fget_light+0x2e9/0x430 [ 259.731411] ? fget_raw+0x20/0x20 [ 259.734904] ? kasan_check_write+0x14/0x20 [ 259.739251] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 259.744208] ? wait_for_completion+0x8a0/0x8a0 [ 259.748817] ? lock_release+0xa10/0xa10 [ 259.752815] ? check_preemption_disabled+0x48/0x200 [ 259.757857] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 259.763422] ? sockfd_lookup_light+0xc5/0x160 [ 259.767946] __sys_sendmsg+0x11d/0x280 [ 259.771858] ? __ia32_sys_shutdown+0x80/0x80 [ 259.776291] ? __sb_end_write+0xd9/0x110 [ 259.780466] ? fput+0x130/0x1a0 [ 259.783773] ? ksys_write+0x1ae/0x260 [ 259.787799] ? trace_hardirqs_off_caller+0x300/0x300 [ 259.792957] __x64_sys_sendmsg+0x78/0xb0 [ 259.797045] do_syscall_64+0x1b9/0x820 [ 259.800953] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 259.806341] ? syscall_return_slowpath+0x5e0/0x5e0 [ 259.811291] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.816372] ? trace_hardirqs_on_caller+0x310/0x310 [ 259.821498] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 259.826536] ? prepare_exit_to_usermode+0x291/0x3b0 [ 259.831584] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.836456] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.841698] RIP: 0033:0x457519 [ 259.844955] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.863973] RSP: 002b:00007fa110032c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 259.871706] RAX: ffffffffffffffda RBX: 00007fa110032c90 RCX: 0000000000457519 [ 259.879066] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000006 [ 259.886359] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 259.893679] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa1100336d4 [ 259.901133] R13: 00000000004c3583 R14: 00000000004d5388 R15: 0000000000000007 [ 259.908562] CPU: 1 PID: 9661 Comm: syz-executor3 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 259.916992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.926364] Call Trace: [ 259.928982] dump_stack+0x244/0x3ab [ 259.932669] ? dump_stack_print_info.cold.2+0x52/0x52 [ 259.937896] ? debug_smp_processor_id+0x1c/0x20 [ 259.942600] ? perf_trace_lock+0x14d/0x7a0 [ 259.946987] should_fail.cold.4+0xa/0x17 [ 259.951080] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.956218] ? lock_is_held_type+0x210/0x210 [ 259.960685] ? lock_downgrade+0x900/0x900 [ 259.960707] ? refcount_sub_and_test_checked+0x203/0x310 [ 259.960727] ? lock_is_held_type+0x210/0x210 [ 259.970363] ? fs_reclaim_acquire+0x20/0x20 [ 259.970381] ? lock_downgrade+0x900/0x900 [ 259.970403] ? perf_trace_sched_process_exec+0x860/0x860 [ 259.970424] ? __crypto_alg_lookup+0x31b/0x390 [ 259.982992] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 259.983432] __should_failslab+0x124/0x180 [ 259.983452] should_failslab+0x9/0x14 [ 260.009015] __kmalloc+0x2e0/0x760 [ 260.012687] ? crypto_larval_alloc+0x1d0/0x1d0 [ 260.017382] ? pointer+0x990/0x990 [ 260.020943] ? crypto_create_tfm+0x87/0x310 [ 260.025442] ? crypto_alg_extsize+0xf/0x80 [ 260.029707] crypto_create_tfm+0x87/0x310 [ 260.033884] crypto_alloc_tfm+0x1b5/0x2d0 [ 260.038062] crypto_alloc_skcipher+0x2c/0x40 [ 260.042492] drbg_init_sym_kernel+0x25d/0x6f0 [ 260.047011] ? drbg_hash_df+0x800/0x800 [ 260.051009] ? __fget+0x4d1/0x740 [ 260.054493] ? ksys_dup3+0x680/0x680 [ 260.058234] ? drbg_hash_df+0x800/0x800 [ 260.062231] drbg_kcapi_seed+0x72c/0x1370 [ 260.066399] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 260.071965] ? drbg_seed+0x1060/0x1060 [ 260.075879] ? __might_fault+0x12b/0x1e0 [ 260.080062] ? lock_downgrade+0x900/0x900 [ 260.084228] ? lock_acquire+0x1ed/0x520 [ 260.088222] ? lock_release+0xa10/0xa10 [ 260.092297] ? perf_trace_sched_process_exec+0x860/0x860 [ 260.097769] ? usercopy_warn+0x110/0x110 [ 260.101848] ? sock_kmalloc+0x15a/0x1f0 [ 260.105859] crypto_rng_reset+0x7c/0x130 [ 260.109947] rng_setkey+0x25/0x30 [ 260.113508] ? rng_sock_destruct+0x90/0x90 [ 260.117968] alg_setsockopt+0x306/0x3b0 [ 260.122023] __sys_setsockopt+0x1ba/0x3c0 [ 260.126281] ? kernel_accept+0x310/0x310 [ 260.130363] ? ksys_write+0x1ae/0x260 [ 260.134187] ? trace_hardirqs_on+0xbd/0x310 [ 260.138525] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.143920] ? trace_hardirqs_off_caller+0x300/0x300 [ 260.149046] __x64_sys_setsockopt+0xbe/0x150 [ 260.153480] do_syscall_64+0x1b9/0x820 [ 260.157470] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 260.162860] ? syscall_return_slowpath+0x5e0/0x5e0 [ 260.167809] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.172692] ? trace_hardirqs_on_caller+0x310/0x310 [ 260.177732] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 260.182768] ? prepare_exit_to_usermode+0x291/0x3b0 [ 260.187868] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.192813] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.198091] RIP: 0033:0x457519 [ 260.201306] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.220371] RSP: 002b:00007fe451533c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 260.228101] RAX: ffffffffffffffda RBX: 00007fe451533c90 RCX: 0000000000457519 [ 260.235418] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 260.242704] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 12:55:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 260.250102] R10: 0000000020ff8000 R11: 0000000000000246 R12: 00007fe4515346d4 [ 260.257390] R13: 00000000004c39b3 R14: 00000000004d59b8 R15: 0000000000000005 12:55:03 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xfffffff4) [ 260.299034] DRBG: could not allocate CTR cipher TFM handle: ctr(aes) [ 260.302605] EXT4-fs (loop2): invalid inodes per group: 16384 [ 260.302605] 12:55:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:03 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 260.403942] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 260.460871] EXT4-fs (loop2): invalid inodes per group: 16384 [ 260.460871] 12:55:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0xa}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000ff8000), 0x0) 12:55:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0xdc}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x6800) 12:55:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x10, &(0x7f0000ff8000), 0x0) 12:55:03 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:03 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x200003d0}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x2, &(0x7f0000ff8000), 0x0) 12:55:04 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f00000001c0)={0x200, 0x1}) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x3, &(0x7f0000ff8000), 0x0) 12:55:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x5}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 261.045031] EXT4-fs: 16 callbacks suppressed [ 261.045065] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 261.045065] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 261.045065] 12:55:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x4, &(0x7f0000ff8000), 0x0) 12:55:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 261.122226] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 261.231789] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 261.252240] EXT4-fs (loop2): invalid inodes per group: 16384 [ 261.252240] 12:55:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x98070000000000) 12:55:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x14}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x8, &(0x7f0000ff8000), 0x0) 12:55:04 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:04 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 261.357060] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 261.396434] EXT4-fs (loop2): invalid inodes per group: 16384 [ 261.396434] 12:55:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x6a, &(0x7f0000ff8000), 0x0) 12:55:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xa000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432f6", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 261.533995] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 261.533995] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 261.533995] 12:55:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0xb, &(0x7f0000ff8000), 0x0) [ 261.576455] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 261.599126] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 261.599126] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 261.599126] [ 261.623852] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:04 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xffe7100000000000) 12:55:04 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x79, &(0x7f0000ff8000), 0x0) 12:55:04 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 261.846077] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 261.846077] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 261.846077] [ 261.870327] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 261.882843] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x5) [ 261.929097] EXT4-fs (loop2): invalid inodes per group: 16384 [ 261.929097] 12:55:05 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x1500000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 262.027762] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 262.061939] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 262.061939] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 262.061939] 12:55:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x6) [ 262.083965] EXT4-fs (loop2): invalid inodes per group: 16384 [ 262.083965] [ 262.099402] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:05 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x4002000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xa00700) 12:55:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xffffff8d) 12:55:05 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740), 0x2}}, 0x20) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 262.291012] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xf401000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 262.331858] EXT4-fs (loop2): invalid inodes per group: 16384 [ 262.331858] 12:55:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xf0ffff) [ 262.405504] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 262.460508] EXT4-fs (loop2): invalid inodes per group: 16384 [ 262.460508] 12:55:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xf7efffff}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:05 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:05 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x10000000) 12:55:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x142800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x18) [ 262.713100] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x100000000000000) 12:55:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xe8030000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 262.794696] EXT4-fs (loop2): invalid inodes per group: 16384 [ 262.794696] 12:55:05 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\a', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:06 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x600000000000000) 12:55:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x1500}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="6578743204", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x1200) 12:55:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x4000000) 12:55:06 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:06 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x11}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xf00) 12:55:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x100000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:06 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:06 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740), 0x2}}, 0x20) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xe803000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 263.565890] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 263.593296] EXT4-fs (loop2): invalid inodes per group: 16384 [ 263.593296] 12:55:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x3f00) [ 263.662783] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 263.716760] EXT4-fs (loop2): invalid inodes per group: 16384 [ 263.716760] 12:55:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xffcf100000000000) 12:55:06 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:06 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:06 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x7) 12:55:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xfffffff0) [ 263.973241] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 264.010617] EXT4-fs (loop2): invalid inodes per group: 16384 [ 264.010617] 12:55:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xffffff7f}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:07 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:07 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xf000) 12:55:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="6578743205", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xc00600) 12:55:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xf401}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xa00000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xfffffffffffff000) 12:55:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:07 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xfffff000) [ 264.554065] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 264.598580] EXT4-fs (loop2): invalid inodes per group: 16384 [ 264.598580] [ 264.662762] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 264.686580] EXT4-fs (loop2): invalid inodes per group: 16384 [ 264.686580] 12:55:07 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x34000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x6000) 12:55:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x30000000) 12:55:07 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x8dffffff) [ 264.843744] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 264.862499] EXT4-fs (loop2): invalid inodes per group: 16384 [ 264.862499] 12:55:08 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xf0ffffffffffff) 12:55:08 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 264.973473] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 265.012244] EXT4-fs (loop2): invalid inodes per group: 16384 [ 265.012244] 12:55:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x20ff8000) 12:55:08 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x101000000) 12:55:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:08 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x5000000) 12:55:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:08 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x500}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 265.490354] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 265.512042] EXT4-fs (loop2): invalid inodes per group: 16384 [ 265.512042] 12:55:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xf000000) [ 265.594758] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 265.621194] EXT4-fs (loop2): invalid inodes per group: 16384 [ 265.621194] 12:55:08 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xa00}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:08 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x2) 12:55:08 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2 ', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xf0ffffff) 12:55:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x1f4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xff07110000000000) 12:55:09 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:09 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x1000000) 12:55:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xffffeff7}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x500000) [ 266.283909] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x4) [ 266.326672] EXT4-fs: 50 callbacks suppressed [ 266.326718] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 266.326718] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 266.326718] [ 266.347973] EXT4-fs (loop2): invalid inodes per group: 16384 [ 266.347973] 12:55:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xe803}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 266.402130] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 266.419723] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 266.419723] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 266.419723] [ 266.440608] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 266.464777] EXT4-fs (loop2): invalid inodes per group: 16384 [ 266.464777] [ 266.473148] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x800001000000) 12:55:09 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:09 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x4002}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:09 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x1000000000000000) 12:55:09 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 266.800467] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 266.856188] EXT4-fs (loop2): invalid inodes per group: 16384 [ 266.856188] 12:55:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x600) [ 266.939236] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 266.939236] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 266.939236] [ 266.987676] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 267.001817] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 267.026112] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 12:55:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x38070000000000) [ 267.026112] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 267.026112] [ 267.027873] EXT4-fs (loop2): invalid inodes per group: 16384 [ 267.027873] 12:55:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xe00}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x80ff2000000000) [ 267.097613] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:10 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:10 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x3000) 12:55:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x700}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 267.293047] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 267.388213] EXT4-fs (loop2): invalid inodes per group: 16384 [ 267.388213] [ 267.416212] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 267.416212] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 267.416212] 12:55:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xf0) [ 267.477467] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 267.494294] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 267.529480] EXT4-fs (loop2): invalid inodes per group: 16384 [ 267.529480] 12:55:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x3f00}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:10 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:10 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r1}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xff27110000000000) 12:55:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:10 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x30) 12:55:10 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x900}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:10 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:10 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r1}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 267.893915] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:11 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xe00000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xf) [ 267.956942] EXT4-fs (loop2): invalid inodes per group: 16384 [ 267.956942] 12:55:11 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r1}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x700000000000000) [ 268.072737] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 268.105044] EXT4-fs (loop2): invalid inodes per group: 16384 [ 268.105044] 12:55:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x500000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xffbf1000) 12:55:11 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff}, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x50000000000000) 12:55:11 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r1}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 268.445769] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x5000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:11 executing program 1: getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 268.512849] EXT4-fs (loop2): invalid inodes per group: 16384 [ 268.512849] 12:55:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x300) 12:55:11 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r1}}]}}) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x200000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 268.639654] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x3000000000000000) [ 268.688430] EXT4-fs (loop2): invalid inodes per group: 16384 [ 268.688430] 12:55:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xa0070000000000) 12:55:11 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x400000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:11 executing program 1: getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:11 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x200000000000000) [ 268.898125] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 268.898224] 9pnet_virtio: no channels available for device / 12:55:12 executing program 4: pipe2(&(0x7f00000013c0), 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xf4010000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 268.946881] EXT4-fs (loop2): invalid inodes per group: 16384 [ 268.946881] 12:55:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x6000000) [ 269.020278] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:12 executing program 1: getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x0, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 269.071348] EXT4-fs (loop2): invalid inodes per group: 16384 [ 269.071348] 12:55:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x1100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 269.206275] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xf000000) 12:55:12 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x300000000000000) 12:55:12 executing program 1: getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 12:55:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x15}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 269.270144] EXT4-fs (loop2): invalid inodes per group: 16384 [ 269.270144] 12:55:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x400000000000000) 12:55:12 executing program 1: getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) [ 269.349754] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 269.371115] EXT4-fs (loop2): invalid inodes per group: 16384 [ 269.371115] 12:55:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:12 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x8dffffff00000000) [ 269.519955] 9pnet_virtio: no channels available for device / [ 269.529415] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x1100000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 269.621951] EXT4-fs (loop2): invalid inodes per group: 16384 [ 269.621951] [ 269.685849] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 269.697789] EXT4-fs (loop2): invalid inodes per group: 16384 [ 269.697789] 12:55:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xa) 12:55:12 executing program 1: getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 12:55:12 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x0, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x3f000000) 12:55:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x15000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 269.850435] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:12 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 12:55:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x7000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x7000000) [ 269.899305] EXT4-fs (loop2): invalid inodes per group: 16384 [ 269.899305] 12:55:13 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r1}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 270.007477] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 270.029567] EXT4-fs (loop2): invalid inodes per group: 16384 [ 270.029567] 12:55:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x80ff20) 12:55:13 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 12:55:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x10e7ff) 12:55:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xa}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x5000) 12:55:13 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r1}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:13 executing program 4: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)) 12:55:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x3f00000000000000) 12:55:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xa0008000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 270.383447] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 270.401764] EXT4-fs (loop2): invalid inodes per group: 16384 [ 270.401764] 12:55:13 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 270.506142] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 270.536585] EXT4-fs (loop2): invalid inodes per group: 16384 [ 270.536585] 12:55:13 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x500000000000000) 12:55:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xf00000000000000) 12:55:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2P', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x3000000) 12:55:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xf5f80300}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:13 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:13 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x2000000) 12:55:13 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x40020000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x500) 12:55:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\n', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x800001000000) 12:55:14 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 271.334150] EXT4-fs: 44 callbacks suppressed [ 271.334188] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 271.334188] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 271.334188] 12:55:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x30070000000000) 12:55:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x281400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x50) 12:55:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:14 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 271.376155] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 271.481994] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x10) [ 271.522506] EXT4-fs (loop2): invalid inodes per group: 16384 [ 271.522506] 12:55:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x80000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 271.573206] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 271.573206] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 271.573206] 12:55:14 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 271.614437] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 271.640217] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 271.651667] EXT4-fs (loop2): invalid inodes per group: 16384 [ 271.651667] 12:55:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xffffff7f00000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x3) 12:55:14 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 271.838568] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 271.882143] EXT4-fs (loop2): invalid inodes per group: 16384 [ 271.882143] [ 271.893431] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 271.893431] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 271.893431] [ 271.934901] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 271.945800] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 271.945800] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 271.945800] [ 271.965287] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 271.973340] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 271.982156] EXT4-fs (loop2): invalid inodes per group: 16384 [ 271.982156] 12:55:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x800901000000) 12:55:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xffffffff00000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xf00000000000000) 12:55:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:15 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:15 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xf0ffffff00000000) 12:55:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x3e8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:15 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x700) 12:55:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 272.315229] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 272.315229] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 272.315229] [ 272.339260] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x401000000) 12:55:15 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f0000000040)={0x192}, 0x8, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) dup3(r0, r0, 0x80000) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 272.466209] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 272.475827] EXT4-fs (loop2): invalid inodes per group: 16384 [ 272.475827] 12:55:15 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x3f8f5}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 272.566761] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 272.605277] EXT4-fs (loop2): invalid inodes per group: 16384 [ 272.605277] 12:55:15 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x2ca) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x40, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000100)={0x0, 0x2, 0x7e0, 0x3, '\x00', 0xece}) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000240)={0x79e, 0x1f, 0x6, 0x8000000000000000, 0x55, 0x2, 0xfffffffffffffd61, 0x1, 0x5, 0x8}, 0xb) socketpair(0x8, 0x80000, 0x8, &(0x7f0000000040)) 12:55:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432f9", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:15 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x4000000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:15 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:15 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x1) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000100)=0x40) r2 = socket$inet6(0xa, 0x2, 0x62e) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x20000004e20}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0xb}, 0x1c) syz_emit_ethernet(0x437, &(0x7f0000000200)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev, @local, {[], @dccp={{0x0, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "2b00b32def4f1142b6793bb530f9b20e90aa25d5c2b9431efd840a07c1922833b2c789aefbbaee9f63cbab38a8acfb8dba0595ecb683e74ea2bc44a7aee9c52e18ca01c06a5c354712b8b1ff75f45ba55a3487c83849023d37e037d2d3e3e842e9ba099e9ed8775d1173d8e78335aa65d58f54c1d78d4fce897cfefa24b7f268f90be76c7f4e1bfe4d84a869353e931c3732afea55697618a1318ecb657b34172b93fd59d7988d43630cf81e976a0ea01fd8b2547ab593bc605c985f56664b84ed3c9f90ffb666e030c794e2d2d5070af38d83dc275da88cfe6910b2ded59f6c418af5d247237eceb14857c1d7c3ee32e729d9793040f8f4e432eb875a89fe31cbed117f0e76643797169fba3dac3f377d145ce97980ba626da7a279e698a9e040a22d63c535f0ee06adb59e9e06ad7295e6601f3a5fe9b581975993c6c775734212bccb26288d42a672c965d40e80d0e1908f04425a60a08241378ec7ff88315de073b64c5f9647e51732be34988e0948f12e6c560bedbece811bca501d4389dbfe20e4df5160cd7324c0670c7b3e8980b061e31b1c8461d6f7a63f9e9fd24326924c076e01631a0b9703a6106accfaa064075fa1f16e16c5171b6a324e8642b2ab76618b824110c312ab12d9f65d6a980634a6a7cba8bf89e01a91259f446232476a1c490982636b78d1300befab1a2f6e8261e07336c5692db37bb7d3cebf4a942b62f2fa6cceb7e488aa02b2e52c6f82bd3792845fff41cce52e0469d14821ce11491864860c11421a92dae3152eb23106a0c679d2b1f0a9809b56abdcf893f9531508f24e64ec911fd8e8b3c8fd2291f1a7b910222c38533d4caadac9acd194be7e53549c1719bdf668887a0e19db83b5356f8f7d93cbef1ef3505dcc40d0d2a02a2745ab518979b9c3774babfe8e70ead767c7a00289b8cc6e51d1a957548270cb3f5064961a88f61b34f9442d78ae5a8551713f9afb4269d689f9adb6b4a902a637184f7f899efe9fa0ddb45cd1076c4eeeda51ca8dc20dcfc9cc5f56768073b3f4c2c9f543324a4fd0b8bc7b95e232bf85bf222394fa4336ab4007d7ad2dc85afa6eb79ad2624c4be6c674ee98fce9a51786b7cc2b5044de114d36d2690e13bcedf96590c7d5aeb8040b74c4d6a5aa38a7c1f0857522f4f968795056b9a7034dc3444784f9486b575e44dec3216d72845500e63297d7197961e7e593ea3411001d1d47ba42d70e7af8e91246c02d7e37ff0eb60abebc37dd00315b4fbb09e77a6b5f7e8441818ebcfafecf622731f1db8a11fa2de8e30d808bedbfee104b3b1100f5094675521da07dd2a28be7e486b325a0f0e6d75116be1bbc2aa20deb64a6e4e7b824b12d009e6f1802f5a8e31559b125d71d00a5684fbde4668f5af1eb4ca04fa7c4ef4d2a194b0856e007"}}}}}}, &(0x7f0000001780)) syz_emit_ethernet(0x437, &(0x7f0000000200)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c22df7", 0x401, 0x11, 0x0, @dev, @local, {[], @dccp={{0x4e22, 0x4e20, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "0087ae", 0x0, "ca8345"}, "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"}}}}}}, &(0x7f0000001780)) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r4 = getpgrp(0x0) lstat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000000cc0)=[0xee01, 0xee01, 0xee00, 0xee00, 0xee00, 0xffffffffffffffff, 0x0, 0x0, 0xee00, 0x0]) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000d00)=0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000000e40)=0xe8) fstat(r0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r3, &(0x7f0000001040)={&(0x7f0000000640)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000b40)=[{&(0x7f00000006c0)="7a869e6bbafe5dd2fd359059f3419e570eeb70c9fe1e34477bdd82fe89b9b23a99149c3bbef8780a", 0x28}, {&(0x7f0000000700)="346ab71947e33496256652a35ece8886a314851d9a0b667ca0456c6b7c480768c7259eee65239e9967ce6106e49ea43ea613de847456de86841f7fede4b62bf2b6b19c4472462706c50bc8", 0x4b}, {&(0x7f0000000780)="af9b389835ba992311999d730fda55d4c0e4e39253e2fd7c125f", 0x1a}, {&(0x7f00000007c0)="61c2494d3b02476925607cc92b41dcd76de57a7a5cdce55ce99a709a218fcf66689df14d962719bd4b12117d7bcfb8508ec8b0d9879b2015233e7138c0e3a6d808756b2e2bf06b84150fcd3f615c2babd1b969f5a15ffa2e2a4ad90e8fde9bd3a7270125ed1a6f3df5a0dc4b5ba57cf6b658044c91ad50f978c214fe49ce25d01f504fca60d0a3434a33a4770e25fd08cca9c9845d4db6e83603de60e78953a9632264", 0xa3}, {&(0x7f0000000880)="ed49ad8e4ea90c2958d485583760112fffe217404c8f1a0968616be9a7bd8835a3591ce3b2b3c9e2d548ad23d7ccd2fa92ad4e2f72e0c770841f2b67119e7f040fdc354d94d32f1c132c3aa506b5103e196fddc587", 0x55}, {&(0x7f0000000900)="dfc41557c8d98a141012f417c8353bb73c40fa593551485c8567dd4191b7e5a2b0022ce0413aa092f89a2a060baea50ab981f2d6ede193c1de1b8029eb6ebce9e7280240f9e66b8ed98b", 0x4a}, {&(0x7f0000000980)="7dfc588c749dfa00b609426cec2bdead566c987221b21cde046329852a77e5bf8a35901c59a8652b0b5269a4046bd7eaa0472c59a47690aa732df301bee19b0101e85ee558b009079b200edab7f1493f5ddfd8ed2a7e3c3969126c3dac000ae1e796f6449e63c183225d7dabf3f0bf500c5b05854079107cd97c0d4bb30a91c7ebfad507c633681f37167c7741b12bce227dc7010990290159ca5bb445e8e7430e1b8668fc29d5735dd2eabb282318822bf8956eb68a082e8c5825c33709e82b03c6feb64b415e5e30a0afb3ff7817b6619d0a19432499fd74f85c3a0adb331f183b04229ee6e20b33f0512f3c0c712d1173b1d2", 0xf4}, {&(0x7f0000000a80)="86881a2bf698b5a33a840c2f", 0xc}, {&(0x7f0000000ac0)="d601ddcafee1bb8865a65475e1fbed36e7483cb850ab924ca7a8d897496fe0072d963be149866ec4e77fe11a05f684f799b3c1326c26f0167d54656f007de86d276a320e4e0925fc52d4c1e58f36edcd1b37328b8b92f0c7be88a1b90a83bfe4e731dac80c9b68f7d91970c532c9ebc665e6703ccdbaa094cd0aabb1d7", 0x7d}], 0x9, &(0x7f0000000f00)=[@rights={0x30, 0x1, 0x1, [r0, r0, r1, r0, r1, r2, r2, r1]}, @rights={0x38, 0x1, 0x1, [r1, r0, r0, r0, r0, r2, r2, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x20, 0x1, 0x1, [r0, r2, r0]}, @rights={0x28, 0x1, 0x1, [r1, r1, r1, r0, r2, r0]}, @rights={0x28, 0x1, 0x1, [r1, r2, r1, r0, r1]}, @rights={0x20, 0x1, 0x1, [r1, r0, r1]}], 0x138, 0x10}, 0x800) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000200)=""/103) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 272.952354] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:55:16 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x105800000) 12:55:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xf5f8030000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:16 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 273.086095] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 273.100605] EXT4-fs (loop2): invalid inodes per group: 16384 [ 273.100605] 12:55:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$gfs2(&(0x7f0000000100)='gfs2\x00', &(0x7f0000000140)='./file0\x00', 0xd2, 0x7, &(0x7f00000007c0)=[{&(0x7f0000000340)="9c3e6815bec41abc8b6aa4bc894090f28537356c7776503ba5da8aed89b238ec25f4468f44e130edd34993bcf3f69b919de6327dcc7c5788fd16f122a3e109d6bebeb8f5e26d94727aa93c4a5486f8404819a5562944d8d4a3a462585f4545b2155e3abb31098a91218ac565774eac3fa90c336371fecedf8abcfbf9cd987e55f666820b04b3a3a400d0e8a4cce3dd5254f3ea99377400d90bae873a33380608a58c45716750aae021d3387094556d8b39f589363bc78bcd654d241e0f9a7411ebc7d4f87313ecd8a1fe47f133b230f48f172962629922b152cb8232fd4ffa92c03b0c16bed528eb259ffa0f9e8e95c21712", 0xf2, 0x1}, {&(0x7f0000000440)="0e19bbb9a8f49e9dbddcdbd1e20814a95ddfc43e9b228d5c904d2b7dfd8073c467e2fa34cf4dbf51a76c1e885fdc944475bcb5b809f6ab3feb5b42f51450bbf85c83e1d0db7f5bb5ebeb2aff58b457b761a09267000f91b4cb4ef0b77935c80d4e0779144855e3345732eb06b536b3e579", 0x71, 0x6}, {&(0x7f00000004c0)="0ba5a7f3c2a1c949aa5ea3c504c9f38a45cd7ccaa8cba7c33b32cb8ff38451dcdfc267864a36b42ca7eaea90dc33347bd41c51a70d36e9b2fd67780a0452770c79741344a9c5a259dfa2ae858a8f99b76fd04c22d1ccd904789bdb825e9b569d5d18c569acedcdaac775c65e868a3b7102e46c53ed9aab3c3a2af95375be980b166b2a3413640b5cd7abaec21f43cb68661c1bff5d91e1dfb604446999cad0ab304a7f8bddc866c7cd86e6425b2ffc1e4095d9c7624a887fd6d4213ba7ea61b5e432c13eb9c4ba1afe716d0200503c2622dbc398", 0xd4, 0x5}, {&(0x7f00000005c0), 0x0, 0x100000000}, {&(0x7f0000000600)="52cea88009dead5fa4f2accf1ce00db4d236c033b10a90b9a43adb1a6ac4aa6157f0dc8d6f6601652c2d76ec1a9be98824b07512dd67519a609667dabdc39af82231c9beb45ed5ad99c9421095d5a5d51bbcb05d68f13e71881d7b4d202b46967fe1d98d1455c6bd50b668d64634a51dce3be72c1e451afc31c939a5ead342", 0x7f, 0x6}, {&(0x7f0000000680)="697300b391bc20681d780c50ed9e926c42aa3bd9df2f5b9b1be154c7a659c4755e32597e64255188d37bdff385df9548400430ab7cc0f19c57e38b2bf72f04d413dedeaab5987f28be9378b569640fbfba98724fbf1448a2f772ea149d530109d171363aab9dc2faf19766a5e95a140d0f", 0x71, 0xffff}, {&(0x7f0000000700)="95d8b282a6a687a9329ee62ef5dee047886677055fcd1d4981314f3c1d475d0a3546fa2716ac3f6006648c8287884c0a3eec34524a241f0a5cd76d62475c91fed8e0a8d195bf372d19bb4c52c5e7c2f2ac7ae82a5f47c5d6bd2a7d0d5f858c1f0ae3cafe65e20687c76c52d2800c31fbcd32c75204c749070f488a737bed2868bf9885918ac10a1ec5", 0x89}], 0x4, &(0x7f0000000880)={[{@ignore_local_fs='ignore_local_fs'}, {@statfs_percent={'statfs_percent', 0x3d, 0xa4d8}}, {@data_writeback='data=writeback'}, {@suiddir='suiddir'}, {@suiddir='suiddir'}, {@localflocks='localflocks'}, {@locktable={'locktable', 0x3d, '}bdev'}}, {@barrier='barrier'}, {@noloccookie='noloccookie'}], [{@measure='measure'}, {@permit_directio='permit_directio'}, {@subj_user={'subj_user', 0x3d, 'rng\x00'}}, {@seclabel='seclabel'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@permit_directio='permit_directio'}, {@subj_user={'subj_user', 0x3d, 'drbg_nopr_ctr_aes256\x00'}}]}) r0 = socket$alg(0x26, 0x5, 0x0) r1 = shmat(0x0, &(0x7f0000ffe000/0x1000)=nil, 0x5000) shmdt(r1) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4f, 0x40000) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f0000000200)={0x1, 0xfffffffffffffff9, 0x0, 0x0, [], [], [], 0x80, 0x20, 0x4, 0xfff, "b32428067e1c94da91e3048b9ce44c07"}) 12:55:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x8000a0ffffffff}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 273.228003] gfs2: statfs_percent mount option requires a numeric argument between 0 and 100 [ 273.261967] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 273.301152] gfs2: can't parse mount arguments 12:55:16 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:16 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x9}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 273.329604] EXT4-fs (loop2): invalid inodes per group: 16384 [ 273.329604] 12:55:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:16 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000200)=0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x2000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x6, 0x4, 0x7, 0x0, 0x2, 0x20010, 0xa, 0x2, 0x7, 0x4, 0x7, 0x9, 0x8, 0xfffffffffffffffe, 0x0, 0x4, 0x80, 0x1000, 0x50f40400, 0xc7c, 0xffffffffffffd351, 0x9, 0x7, 0x0, 0x7, 0xf28, 0x4de, 0x0, 0xb5ac, 0x2, 0xffffffff, 0x4, 0x400, 0x2, 0xfff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040)}, 0x22800, 0x100000000, 0x8, 0x6, 0x8, 0x8, 0x3}, r0, 0x10, r1, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 273.528677] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x1000000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="cdbe9ebb6ee3f29d1c80591a01dd1c5d13964aacb3ef154cdc2db6c593f4964adc670ef78151970846c800dabc241d6ac254e90211a6bd3d99c9eeca299bca403708e37279523e0545de83c738939931ca68f8d4f110c6dacda81e21f505dc6aa6e02dabb7531b40d2b3c0e2c4e753eeb6948a90f2ce133b263f30", 0x7b) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x2800) 12:55:16 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 273.604262] EXT4-fs (loop2): invalid inodes per group: 16384 [ 273.604262] 12:55:16 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:16 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_tables_matches\x00') getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r2, 0x4) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000240)={0x2, 0x5, 0x6, 0x6, 0x0, 0x8, 0x4c, 0x50000000000000, 0x1, 0x80000000}) [ 273.701703] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 273.733187] EXT4-fs (loop2): invalid inodes per group: 16384 [ 273.733187] 12:55:16 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x3400000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0xffffff5a, 0x3e5, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x85) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000240)={0x0, @speck128}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x200, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000200)) tee(r1, r3, 0x10000, 0x6) write$P9_RCREATE(r2, &(0x7f0000000100)={0x18, 0x73, 0x2, {{0x20, 0x1, 0x7}, 0x7}}, 0x18) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x37f) 12:55:17 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:17 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x8000a0}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 273.965278] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 273.992454] EXT4-fs (loop2): invalid inodes per group: 16384 [ 273.992454] 12:55:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x1000000000000) socket$alg(0x26, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0cdac3964c735acd7d1e8b335e1f78b688e394ba0d64469e51b450374d9d57a0301f83ce7eb210d03eaf906f1ad6a629398b6989e4dac30a496362a5f1eb304e147ab79fe43294af6f82cf067c878f715c297d3b166befeed96ce1fe02ea31a9a25df14480a0a711fd1418358fc0a70699eec63b11dccfebb469467c71fa30e8832c7f5366083a86d84275e8e1bd3e31fcbb0dca4b11ea83b3827c1fc23051950f062981373895baf99693907543da310b9d20db1c81e8946aac91cb16503fddb7c380236c5094f8bc91b63a", 0x6) sysfs$1(0x1, &(0x7f0000000040)='drbg_nopr_ctr_aes256\x00') [ 274.081150] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 274.101533] EXT4-fs (loop2): invalid inodes per group: 16384 [ 274.101533] 12:55:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x240}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xf4ffffff00000000) 12:55:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:17 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:17 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xe}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x7}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0x7f, 0x2) write$P9_RAUTH(r1, &(0x7f0000000200)={0x14, 0x67, 0x2, {0x5, 0x2, 0x3}}, 0x14) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="f0000000b794a9094cb686ad9501fda7cff34cf47d5e22314a37d165db800142a648613d78cc54aa7896d4343a2c582d14a5c2896c01c226cd25a3be95192958729ece34c9f76ac7b30beda792235384959e5c65b9704e15f4439d38e222a952feb74f08006cce70ca88b2f21cb56d18b115c0727aa2f78c2b3889ae701923a5534c0651479793de5e27f9cfb2da40f2222fd60359f8712dc17507cfa5d53005207946d815d3265b3b207e04f92aa7853decbc786ec3512189fa6aec0c328d7bb40445b73fa43da63d248cd8353c1f6b9ad9b988a0c0a25d0b984840495199f2e811e14acef14c598dd284b2", @ANYRES16=r3, @ANYBLOB="050927bd7000fedbdf250b0000004c00010008000500010000000c0006006c626c6372000000080005000000000008000b00736970000c0007000000000000000000080001000a000000080005000400000008000500040000004c0003001400060000000000000000000000ffffac1414aa1400020076657468315f746f5f627269646765000800080003000000080003000300000008000400ff0000000800010003000000340002000800090002000000080002004e230000080007000100000008000900010100000800060007000000080003000600000008000500070000000800060001000000"], 0xf0}, 0x1, 0x0, 0x0, 0x4}, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432c0", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:17 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x2000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:17 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:17 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740), 0x2}}, 0x20) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xa80600) 12:55:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000400)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000480)={0x6, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f00000005c0)={r2, &(0x7f00000004c0)=""/198}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x8000, 0x0) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000640)=0x5, 0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r5, &(0x7f0000000100)={0x18, 0x1, 0x0, {0x6}}, 0x18) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000200)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@remote, @in6=@dev={0xfe, 0x80, [], 0xd}, 0x4e21, 0x0, 0x4e24, 0x9, 0x2, 0x20, 0xa0, 0x0, 0x0, r6}, {0x0, 0x3, 0x4, 0xa84, 0x81, 0x5, 0xa, 0x9}, {0x1f, 0x7, 0x3, 0x5}, 0x4000400000000, 0x6e6bb9, 0x2, 0x1}, {{@in=@multicast2, 0x4d2}, 0xa, @in6=@local, 0x3504, 0x2, 0x3, 0x9838, 0x5, 0x10000, 0x101}}, 0xe8) setxattr$security_capability(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='security.capability\x00', &(0x7f0000000700)=@v2={0x2000000, [{0x2, 0xc7}, {0xcf7700}]}, 0x14, 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x700000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432fd", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:18 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:18 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740), 0x2}}, 0x20) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x11000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="6578743203", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000140)) socketpair(0x13, 0x803, 0x4, &(0x7f0000000040)) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfff, 0x4000) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000002c0)=@int=0xa3, 0x4) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(serpent)\x00'}, 0x2b9) fsetxattr(r0, &(0x7f0000000100)=@known='trusted.overlay.redirect\x00', &(0x7f0000000140)=':\x00', 0x2, 0x3) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000280)={0x396a, 0x0, 0x6, 0x6, 0x97, 0x30}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:18 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xff3f1100) 12:55:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x3400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:18 executing program 3: r0 = memfd_create(&(0x7f0000000040)='posix_acl_access\x00', 0x4) readahead(r0, 0x8, 0x8) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000280)={@vsock={0x28, 0x0, 0xffffffff, @hyper}, {&(0x7f0000000200)=""/15, 0xf}, &(0x7f0000000240), 0x40}, 0xa0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x80, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000400)={'ifb0\x00', 0x4000}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000380)={0x4, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x4e24, @rand_addr=0x8}, 0x240, 0x9, 0x0, 0x81bf, 0x20, &(0x7f0000000340)='ip6tnl0\x00', 0x24, 0x3, 0x6}) 12:55:18 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 275.466789] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 275.505270] EXT4-fs (loop2): invalid inodes per group: 16384 [ 275.505270] 12:55:18 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000100)=ANY=[@ANYBLOB="060009001800000001000000000000000700000001010000f0ff000001000000"]) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 275.576826] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 275.597217] EXT4-fs (loop2): invalid inodes per group: 16384 [ 275.597217] 12:55:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xffffffffffffffff}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:18 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x34}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:18 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000eed000)={0x2, 0x1}, 0x10) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x4, 0x680400) getpeername$netlink(r3, &(0x7f0000000200), &(0x7f0000000280)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvmsg(r2, &(0x7f00000002c0)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000580), 0x0, &(0x7f0000000640)=""/138, 0x8a}, 0x0) shutdown(r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r4) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:18 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 275.870945] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 275.918862] EXT4-fs (loop2): invalid inodes per group: 16384 [ 275.918862] [ 276.003503] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 276.025460] EXT4-fs (loop2): invalid inodes per group: 16384 [ 276.025460] 12:55:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x400700) 12:55:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xf7efffff00000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:19 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740), 0x2}}, 0x20) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:19 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x40000, 0x59) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000012c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001300)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @rand_addr}}, 0x0, @in6=@mcast1}}, &(0x7f0000001400)=0xe8) stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f00000016c0)) r5 = getpgrp(0xffffffffffffffff) r6 = getuid() getresgid(&(0x7f0000001500), &(0x7f0000001540), &(0x7f0000001580)=0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000001700)={0xaa, 0x9, 0x7}) sendmsg$netlink(r1, &(0x7f0000001640)={&(0x7f0000000100)=@kern={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001280)=[{&(0x7f0000000140)={0x24, 0x31, 0x118, 0x70bd2b, 0x25dfdbfe, "", [@typed={0x14, 0x65, @ipv6=@mcast2}]}, 0x24}, {&(0x7f0000000200)={0x1070, 0x35, 0x0, 0x70bd25, 0x25dfdbfc, "", [@generic="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", @typed={0x1c, 0x9, @str='drbg_nopr_ctr_aes256\x00'}, @typed={0x8, 0x50, @str='rng\x00'}, @typed={0x8, 0x45, @ipv4=@loopback}, @generic="1d7b2d9809d924daa3b96611dc2edeec1d6ccc511a1177b3eaebf8fc442404d21b116678a852b44a3a12572726c097962542"]}, 0x1070}], 0x2, &(0x7f00000015c0)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="000000001000000000000000010000000100000020000000000000000100000002000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0x80, 0x20000040}, 0x80) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, &(0x7f0000ff8000), 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001680)) 12:55:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x3f00000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:19 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:19 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x80, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0x0, @mcast2, 0x7f}, @in6={0xa, 0x4e23, 0x7f, @ipv4={[], [], @loopback}, 0x3f}, @in6={0xa, 0x4e21, 0x9, @remote, 0x7ff}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e20, 0xfffffffffffffff8, @dev={0xfe, 0x80, [], 0x15}, 0x5}]}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x1, &(0x7f0000000100)={0x4, &(0x7f0000000040)=[{0x7, 0x8, 0x976, 0x7}, {0x8000, 0xcf79, 0x0, 0x7}, {0x2, 0x0, 0x1, 0x5c}, {0x7f, 0x20, 0x1be, 0x8}]}) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0xfffffffffffffe4a) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="bcd1678d75957426549d30c5bed7a4d25d1f492d99107f5751e1a5e7f88f52940f944a7dbe769cdf395b3276beb7405e2fd172ef4fdffe57b61f58d484a98aa9f956f31af51e2d34ac43342579c6ace9c7e6825442e8ce74a3295759de4a1d35592263546011836559a00ed341cbc490d829a0ab4bb2d46b1d1f427d132d2314ef2fdb22ee476c3ebe95f374d65c70061be3680d059b7c2000", 0xffffffffffffff7a) sysfs$2(0x2, 0x7, &(0x7f0000000200)=""/191) 12:55:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x9000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 276.461495] EXT4-fs: 48 callbacks suppressed [ 276.461529] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 276.461529] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 276.461529] [ 276.564880] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 276.586345] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 276.586345] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 276.586345] [ 276.605244] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x4800) 12:55:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x5}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:19 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x1, r1}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x50000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000280)={0x8001, 0x1, 0x2, 0xeffdfda2d13dc914, 0x6636}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:19 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:19 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 276.722781] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 276.730683] EXT4-fs (loop2): invalid inodes per group: 16384 [ 276.730683] 12:55:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000200)) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0x81) [ 276.800460] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x14280000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 276.881866] EXT4-fs (loop2): invalid inodes per group: 16384 [ 276.881866] [ 276.916383] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 276.916383] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 276.916383] 12:55:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 276.936189] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0xf4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x8200) getpeername$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, &(0x7f0000000140)=0x1c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e20, @broadcast}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000300)={r2, 0x6}, &(0x7f0000000340)=0x8) [ 277.003697] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 277.003697] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 277.003697] 12:55:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x1500000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 277.050414] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 277.052264] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xe000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 277.105604] EXT4-fs (loop2): invalid inodes per group: 16384 [ 277.105604] [ 277.181555] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 277.215218] EXT4-fs (loop2): invalid inodes per group: 16384 [ 277.215218] 12:55:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x800401000000) 12:55:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = accept4$inet6(r1, 0x0, &(0x7f0000000100), 0x800) r3 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x40100, 0x40) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000200)={0x5, 0x1, {0x1, 0x1, 0x2, 0x0, 0xfffffffffffffff7}}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000002c0)={0x6, &(0x7f0000000280)=[{0x1, 0x8, 0x3, 0x3ff}, {0xb65, 0x40000, 0x7, 0x2d8b037f}, {0x1, 0x8, 0x38000000, 0x19}, {0x8, 0x80, 0x8, 0xae1}, {0x3, 0x7ff, 0x8, 0x7fff8000000000}, {0x7ad, 0x0, 0x10000, 0xc244}]}, 0x10) 12:55:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x14280000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:20 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="6578743210", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000004740)=[{&(0x7f0000000500)=""/149, 0x95}], 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = dup3(r1, r0, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f00000005c0)=ANY=[@ANYBLOB="030000000000000007000000020000000000000040000000000400000002000000000000000000000000000000000000000000000000000000feffff0300000000000000000000000104000005000000000000000000000000000000000000000000000000000000faffffff030000000000000000000000ff7f000003000000000000000000000000000000000000000000000000000000fab01e567906e7b8d69b67a76243305f1f3852db7c0144ab81dafc0069b8a1296664f2c10d3d5b0d43db6cc1a3837acb63308253c7b84ef3f8def76a9d3429e9840cf7d04ca2afb00aa93d008da9259f0d4ffd9c98ca6dfc26d1593b98cdb984d6155b14c1bdd7bb6114da486dffd70ed04e604a62f8ad014a38f7ea5f964ce0c7374f907b469baa9cdbd06e53961e472cd370a99f9a6f398c5671cf2192dd54cf961f365de4001489f6d9b918fe793cd52d32599eb66d7fa130f2ee6786269a8b1a3482e44f13aa86b4671e5767947634cfff556a6e877aad224c34d938167293576bc69a62dd025568413f990b64ecabc2376f3c933a998373421d35f2d7046fd3b1f37432495d835cedf1ea1bd0f5b61f2473c89331ed95b515faf8d889f36f07ea9e6ab4eb17c1746c85fd6d82"]) shutdown(r3, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r4, 0x1000000000016) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000003c0)={[0x10f005, 0x101000, 0x0, 0xf000], 0x40, 0x2, 0xffffffff}) r5 = socket$alg(0x26, 0x5, 0x0) r6 = semget(0x3, 0x1, 0x18) semctl$GETALL(r6, 0x0, 0xd, &(0x7f0000000100)=""/35) bind$alg(r5, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000ff8000), 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xdc, "2bbd9d4cb8faff1890f0cb283efdbccfe86e09ae364bc5db1550dba4a7b83455b1873a0734d8a552f49e8bf945515c124bbe634ab336eaa9d678568c8eb1eaa05544f695fe85cc3d2a3b485823880f8131524b1619d3be59901f0a243083572d1475f9923fe60d64520ed70f68bef9b3b4f8dc838fe333c577181d34b2f5ef0a4b1106b2a6a362f31b01601ce67788fa66130539257aa1ed02beb6da2378eab5c92cdfb18d44fe33fbc1327a4533cb78f0e982a9988531aa967a21107c54d20dfc6b77139c86394d51e321b70a3815864793c31bfbd6550117df4775"}, &(0x7f0000000140)=0xe4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000300)={r7, 0x61, "ae73de86617d97224798a40d3cbabf59a2584b6735e0d416467de27e57c20a9d6ae97c9c6ac3234af09ef124d642df13b7977f41cf33c66349134493e08cf1b4ad55dbed15ac0872d280ed0fce903c404d81d4dcb6e4e34f8ff42c351fe45eab0f"}, &(0x7f0000000380)=0x69) 12:55:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0xffffffffa0008000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:20 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x4800) 12:55:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 277.585298] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 277.585298] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 277.585298] [ 277.623022] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x900000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 277.642584] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 277.658941] EXT4-fs (loop2): invalid inodes per group: 16384 [ 277.658941] [ 277.755619] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 277.772664] EXT4-fs (loop2): invalid inodes per group: 16384 [ 277.772664] 12:55:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x60000000000000) 12:55:20 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x3f000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:20 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000100)=0x400) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = getpgid(0xffffffffffffffff) fcntl$lock(r2, 0x7, &(0x7f0000000040)={0x2, 0x2, 0x9a0, 0x10001, r3}) r4 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000280)) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000002c0)={0x4bc, {{0xa, 0x4e23, 0x3, @empty, 0xfffffffffffffffd}}, 0x1, 0x2, [{{0xa, 0x4e20, 0x5, @remote, 0xe20}}, {{0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0x16}, 0x2000000000}}]}, 0x190) bind$alg(r4, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fanotify_init(0x0, 0x0) readv(r0, &(0x7f0000004740)=[{&(0x7f0000000500)=""/149, 0x95}], 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$alg(0x26, 0x5, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r3 = dup3(r1, r0, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) shutdown(r3, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r4, 0x1000000000016) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000003c0)={[0x10f005, 0x101000, 0x0, 0xf000], 0x40, 0x2, 0xffffffff}) r5 = socket$alg(0x26, 0x5, 0x0) r6 = semget(0x3, 0x1, 0x18) semctl$GETALL(r6, 0x0, 0xd, &(0x7f0000000100)=""/35) bind$alg(r5, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000ff8000), 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0xdc, "2bbd9d4cb8faff1890f0cb283efdbccfe86e09ae364bc5db1550dba4a7b83455b1873a0734d8a552f49e8bf945515c124bbe634ab336eaa9d678568c8eb1eaa05544f695fe85cc3d2a3b485823880f8131524b1619d3be59901f0a243083572d1475f9923fe60d64520ed70f68bef9b3b4f8dc838fe333c577181d34b2f5ef0a4b1106b2a6a362f31b01601ce67788fa66130539257aa1ed02beb6da2378eab5c92cdfb18d44fe33fbc1327a4533cb78f0e982a9988531aa967a21107c54d20dfc6b77139c86394d51e321b70a3815864793c31bfbd6550117df4775"}, &(0x7f0000000140)=0xe4) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000300)={r7, 0x61, "ae73de86617d97224798a40d3cbabf59a2584b6735e0d416467de27e57c20a9d6ae97c9c6ac3234af09ef124d642df13b7977f41cf33c66349134493e08cf1b4ad55dbed15ac0872d280ed0fce903c404d81d4dcb6e4e34f8ff42c351fe45eab0f"}, &(0x7f0000000380)=0x69) 12:55:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x11}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 277.956972] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 277.982085] EXT4-fs (loop2): invalid inodes per group: 16384 [ 277.982085] 12:55:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)="2f70726f632f7379732f6e65742f697076342ffc16b8ac251976", 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 278.084926] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 278.120999] EXT4-fs (loop2): invalid inodes per group: 16384 [ 278.120999] 12:55:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x240}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0xa0, &(0x7f0000000200)=[@in6={0xa, 0x4e21, 0x4, @remote, 0x7ff}, @in6={0xa, 0x4e21, 0x8, @remote, 0x7}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e23, 0x6, @loopback, 0x4}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e21, 0x1f, @mcast1, 0x81d}, @in={0x2, 0x4e20, @rand_addr=0x3}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000140)={r3, 0x1000}, &(0x7f00000002c0)=0x8) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000300)=0x7) 12:55:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 278.326888] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 278.348904] EXT4-fs (loop2): invalid inodes per group: 16384 [ 278.348904] 12:55:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xb00700) 12:55:21 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e22, 0x8000, @dev={0xfe, 0x80, [], 0xe}, 0xddc}, {0xa, 0x4e20, 0x5, @remote}, 0xfff, [0x0, 0x37, 0x0, 0x0, 0x8, 0x2, 0xfffffffffffff001, 0x7]}, 0x5c) 12:55:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xe00}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 278.436920] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x20) ioctl$void(r0, 0xc0045878) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000200)=0xb) [ 278.479563] EXT4-fs (loop2): invalid inodes per group: 16384 [ 278.479563] 12:55:21 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="6578743297", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:21 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:dpkg_exec_t:s0\x00', 0x142, 0x1) 12:55:21 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) shmctl$SHM_INFO(r4, 0xe, &(0x7f0000000300)=""/204) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x10efff) 12:55:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x1f4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:21 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x35c) 12:55:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:21 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xf4010000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 278.922484] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 278.930418] EXT4-fs (loop2): invalid inodes per group: 16384 [ 278.930418] 12:55:22 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, &(0x7f0000000100)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:22 executing program 4: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x14280000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 279.067197] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 279.097672] EXT4-fs (loop2): invalid inodes per group: 16384 [ 279.097672] 12:55:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sequencer\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') accept$packet(0xffffffffffffff9c, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000005c0)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@remote}}, &(0x7f00000006c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000740)=0x14, 0x0) recvmmsg(r0, &(0x7f00000034c0)=[{{&(0x7f0000000880)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000900)=""/106, 0x6a}, {&(0x7f0000000980)=""/181, 0xb5}, {&(0x7f0000000a40)=""/102, 0x66}, {&(0x7f0000000ac0)=""/72, 0x48}, {&(0x7f0000000b40)}, {&(0x7f0000000b80)=""/52, 0x34}, {&(0x7f0000000bc0)=""/117, 0x75}, {&(0x7f0000000c40)=""/113, 0x71}], 0x8, &(0x7f0000000d40)=""/163, 0xa3, 0x100}, 0x2}, {{&(0x7f0000000e00)=@alg, 0x80, &(0x7f0000002000)=[{&(0x7f0000000e80)=""/4096, 0x1000}, {&(0x7f0000001e80)=""/237, 0xed}, {&(0x7f0000001f80)=""/128, 0x80}], 0x3, &(0x7f0000002040)=""/214, 0xd6, 0x2}, 0xfff}, {{&(0x7f0000002140)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000032c0)=[{&(0x7f00000021c0)=""/4096, 0x1000}, {&(0x7f00000031c0)=""/177, 0xb1}, {&(0x7f0000003280)=""/22, 0x16}], 0x3, 0x0, 0x0, 0xbc3a}, 0x1}, {{0x0, 0x0, &(0x7f0000003400)=[{&(0x7f0000003300)=""/203, 0xcb}], 0x1, &(0x7f0000003440)=""/121, 0x79, 0xef5}, 0x3}], 0x4, 0x40010000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f00000035c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003600)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000003640)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000003680)={@broadcast, @rand_addr, 0x0}, &(0x7f00000036c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000003980)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003b00)={{{@in6=@ipv4={[], [], @local}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000003c00)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000003f80)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000003f40)={&(0x7f0000003c40)={0x2e4, r2, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}]}}, {{0x8, 0x1, r7}, {0xfc, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0xf8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x2, 0x38d, 0x400, 0x8}, {0xda74, 0x1, 0x6, 0x100000000}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}]}}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x8000}, 0x40) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r12 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r12, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000200), r13, 0x1}}, 0x18) 12:55:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="6578743210", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:22 executing program 1: pipe2(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) mount$9p_xen(&(0x7f0000000500)='ext-\x00', &(0x7f0000000540)='./file1\x00', &(0x7f0000000580)='9p\x00', 0x400, &(0x7f0000000700)={'trans=xen,', {[{@access_uid={'access', 0x3d, r2}}]}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004c00), &(0x7f0000004c40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004c80)={{{@in6=@mcast1, @in6=@ipv4={[], [], @remote}}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000004d80)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004dc0), &(0x7f0000004e00)=0xc) getpgrp(0x0) fstat(0xffffffffffffffff, &(0x7f0000005b00)) getpid() setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000280)=0x4, 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000064c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000006740)={{{@in6, @in6=@loopback}}, {{@in6=@dev}, 0x0, @in=@dev}}, &(0x7f0000006840)=0x72) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@local, @in=@local}}, {{@in6}}}, &(0x7f00000000c0)=0xe8) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000009880)) getgroups(0x3, &(0x7f0000009a00)=[0x0, 0x0, 0xee00]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000780)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000740)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000007c0)={0x14, 0x88, 0xfa00, {r3, 0x10, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast2}, 0x7fff}}}, 0x90) getresuid(&(0x7f0000009a40), &(0x7f0000009a80), &(0x7f0000009ac0)) shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffb000/0x3000)=nil) epoll_wait(r0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x10e000000) 12:55:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x3f00}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x14280000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r1 = dup(r0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040)={0x77359400}, 0x10) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000100)={0x77359400}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="c398efc599403b023f6236a3739edbf6c0238fc69ca22a9cfc6507bfbc153f09516df6b1fa3918e1e7acba2f837675f405a2117ab6c6c795344df6a3c0f5213a903faf04993af6064df851c1d2400e0aa942b58698203f5d2e799a5697a87d91d51597fc5b6f06a262183436c20ae0e6196a6798e056ce4acd39936bdbcfb3283a6a23e192732daa950412b22507131ab964e4f4a2a6cd4ae1b6f45b26fef993b42a30dcb2a108b78a", 0xa9) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f00000002c0)={0x5, 0x20, 0x7000000000000, 'queue0\x00', 0x9}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:22 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fremovexattr(r0, &(0x7f0000000040)=@random={'trusted.', 'ppp0wlan1]vboxnet1\x00'}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000007c0)="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", 0xfffffffffffffcba) 12:55:22 executing program 1 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 279.555255] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:22 executing program 4 (fault-call:4 fault-nth:0): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:22 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xf401}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 279.603913] EXT4-fs (loop2): invalid inodes per group: 16384 [ 279.603913] [ 279.654597] FAULT_INJECTION: forcing a failure. [ 279.654597] name failslab, interval 1, probability 0, space 0, times 0 [ 279.682973] FAULT_INJECTION: forcing a failure. [ 279.682973] name failslab, interval 1, probability 0, space 0, times 0 [ 279.704020] CPU: 0 PID: 11842 Comm: syz-executor1 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 279.712609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.721986] Call Trace: [ 279.724590] dump_stack+0x244/0x3ab [ 279.728231] ? dump_stack_print_info.cold.2+0x52/0x52 [ 279.733426] ? lock_downgrade+0x900/0x900 [ 279.737578] should_fail.cold.4+0xa/0x17 [ 279.741656] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.746769] ? __f_unlock_pos+0x19/0x20 [ 279.750744] ? lock_downgrade+0x900/0x900 [ 279.754897] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 279.760440] ? proc_fail_nth_write+0x9e/0x210 [ 279.764940] ? proc_cwd_link+0x1d0/0x1d0 [ 279.769009] ? kasan_check_read+0x11/0x20 [ 279.773159] ? do_raw_spin_unlock+0xa7/0x2f0 [ 279.777580] ? fs_reclaim_acquire+0x20/0x20 [ 279.781907] ? lock_downgrade+0x900/0x900 [ 279.786054] ? wait_for_completion+0x8a0/0x8a0 [ 279.790651] ? perf_trace_sched_process_exec+0x860/0x860 [ 279.796111] ? fsnotify+0xf10/0xf10 [ 279.799741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.805282] __should_failslab+0x124/0x180 [ 279.809516] should_failslab+0x9/0x14 [ 279.813318] __kmalloc+0x2e0/0x760 [ 279.816863] ? strncpy_from_user+0x5a0/0x5a0 [ 279.821275] ? fput+0x130/0x1a0 [ 279.824556] ? __x64_sys_memfd_create+0x142/0x4f0 [ 279.829404] __x64_sys_memfd_create+0x142/0x4f0 [ 279.834077] ? memfd_fcntl+0x18b0/0x18b0 [ 279.838146] do_syscall_64+0x1b9/0x820 [ 279.842037] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 279.847413] ? syscall_return_slowpath+0x5e0/0x5e0 [ 279.852350] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.857199] ? trace_hardirqs_on_caller+0x310/0x310 [ 279.862220] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 279.867244] ? prepare_exit_to_usermode+0x291/0x3b0 [ 279.872267] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.877115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.882301] RIP: 0033:0x457519 [ 279.885499] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.904404] RSP: 002b:00007f9f9d847a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 279.912121] RAX: ffffffffffffffda RBX: 0000000020001800 RCX: 0000000000457519 [ 279.919397] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 279.926679] RBP: 000000000072bf00 R08: 0000000000000820 R09: 00000000fbad8001 [ 279.933951] R10: 0000000020001800 R11: 0000000000000246 R12: 00007f9f9d8486d4 [ 279.941223] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 12:55:23 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r2 = dup3(r1, r0, 0x80000) recvmsg$kcm(r2, &(0x7f0000000300)={&(0x7f0000000100)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000200)=""/248, 0xf8, 0x2bfc}, 0x0) [ 279.957413] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 279.991381] EXT4-fs (loop2): invalid inodes per group: 16384 [ 279.991381] [ 279.998780] CPU: 0 PID: 11850 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 280.007281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.016661] Call Trace: [ 280.019292] dump_stack+0x244/0x3ab [ 280.022938] ? dump_stack_print_info.cold.2+0x52/0x52 [ 280.028149] ? lock_downgrade+0x900/0x900 [ 280.032308] should_fail.cold.4+0xa/0x17 [ 280.036378] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.041492] ? __f_unlock_pos+0x19/0x20 [ 280.045474] ? lock_downgrade+0x900/0x900 [ 280.049629] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 280.055196] ? proc_fail_nth_write+0x9e/0x210 [ 280.059700] ? proc_cwd_link+0x1d0/0x1d0 [ 280.063764] ? kasan_check_read+0x11/0x20 [ 280.067919] ? do_raw_spin_unlock+0xa7/0x2f0 [ 280.072344] ? fs_reclaim_acquire+0x20/0x20 [ 280.076684] ? lock_downgrade+0x900/0x900 [ 280.080840] ? wait_for_completion+0x8a0/0x8a0 [ 280.085436] ? perf_trace_sched_process_exec+0x860/0x860 [ 280.090897] ? fsnotify+0xf10/0xf10 [ 280.094534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.100109] __should_failslab+0x124/0x180 [ 280.104412] should_failslab+0x9/0x14 [ 280.108232] __kmalloc+0x2e0/0x760 [ 280.111778] ? strncpy_from_user+0x5a0/0x5a0 [ 280.116200] ? fput+0x130/0x1a0 [ 280.119488] ? __x64_sys_memfd_create+0x142/0x4f0 [ 280.124340] __x64_sys_memfd_create+0x142/0x4f0 [ 280.129016] ? memfd_fcntl+0x18b0/0x18b0 [ 280.133091] do_syscall_64+0x1b9/0x820 [ 280.136986] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 280.142357] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.147286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.152136] ? trace_hardirqs_on_caller+0x310/0x310 [ 280.157155] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 280.162184] ? prepare_exit_to_usermode+0x291/0x3b0 [ 280.167219] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.172080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.177275] RIP: 0033:0x457519 [ 280.180472] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.199383] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 12:55:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x3400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 280.207108] RAX: ffffffffffffffda RBX: 0000000020001800 RCX: 0000000000457519 [ 280.214377] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 280.221659] RBP: 000000000072bf00 R08: 0000000000000820 R09: 00000000fbad8001 [ 280.228963] R10: 0000000020001800 R11: 0000000000000246 R12: 00007efcb5aed6d4 [ 280.236233] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 12:55:23 executing program 1 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x7800) 12:55:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xffffffffffffffff}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:23 executing program 4 (fault-call:4 fault-nth:1): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 280.354445] FAULT_INJECTION: forcing a failure. [ 280.354445] name failslab, interval 1, probability 0, space 0, times 0 [ 280.391432] CPU: 1 PID: 11869 Comm: syz-executor1 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 280.399958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.399966] Call Trace: [ 280.399991] dump_stack+0x244/0x3ab [ 280.400017] ? dump_stack_print_info.cold.2+0x52/0x52 [ 280.421201] ? debug_smp_processor_id+0x1c/0x20 [ 280.425878] ? perf_trace_lock+0x14d/0x7a0 [ 280.425897] should_fail.cold.4+0xa/0x17 [ 280.425916] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.439304] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 280.439324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.449871] ? perf_trace_lock+0x14d/0x7a0 [ 280.454110] ? lock_downgrade+0x900/0x900 [ 280.458258] ? lock_is_held_type+0x210/0x210 [ 280.462680] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 280.467612] ? lock_is_held_type+0x210/0x210 [ 280.472029] ? fs_reclaim_acquire+0x20/0x20 [ 280.476350] ? lock_downgrade+0x900/0x900 [ 280.480502] ? expand_files.part.8+0x571/0x9a0 [ 280.485084] ? perf_trace_sched_process_exec+0x860/0x860 [ 280.490534] ? iterate_fd+0x4b0/0x4b0 [ 280.494340] __should_failslab+0x124/0x180 [ 280.498579] should_failslab+0x9/0x14 [ 280.502381] kmem_cache_alloc+0x2be/0x730 [ 280.506535] ? shmem_destroy_callback+0xc0/0xc0 [ 280.511207] shmem_alloc_inode+0x1b/0x40 [ 280.515266] alloc_inode+0x63/0x190 [ 280.518892] new_inode_pseudo+0x71/0x1a0 [ 280.522957] ? prune_icache_sb+0x1c0/0x1c0 [ 280.527202] ? _raw_spin_unlock+0x2c/0x50 [ 280.531352] new_inode+0x1c/0x40 [ 280.535219] shmem_get_inode+0xf1/0x920 [ 280.539202] ? shmem_encode_fh+0x340/0x340 [ 280.543442] ? lock_downgrade+0x900/0x900 [ 280.547592] ? lock_release+0xa10/0xa10 [ 280.551565] ? perf_trace_sched_process_exec+0x860/0x860 [ 280.557017] ? usercopy_warn+0x110/0x110 [ 280.561092] __shmem_file_setup.part.50+0x83/0x2a0 [ 280.566033] shmem_file_setup+0x65/0x90 [ 280.570013] __x64_sys_memfd_create+0x2af/0x4f0 [ 280.574681] ? memfd_fcntl+0x18b0/0x18b0 [ 280.578755] do_syscall_64+0x1b9/0x820 [ 280.582649] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 280.588022] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.592978] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.597827] ? trace_hardirqs_on_caller+0x310/0x310 [ 280.602861] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 280.607880] ? prepare_exit_to_usermode+0x291/0x3b0 [ 280.612901] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.617746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.622935] RIP: 0033:0x457519 [ 280.626131] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 280.645030] RSP: 002b:00007f9f9d847a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 280.652741] RAX: ffffffffffffffda RBX: 0000000020001800 RCX: 0000000000457519 [ 280.660009] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 280.667273] RBP: 000000000072bf00 R08: 0000000000000820 R09: 00000000fbad8001 [ 280.674537] R10: 0000000020001800 R11: 0000000000000246 R12: 00007f9f9d8486d4 [ 280.681807] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 [ 280.696282] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:23 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x5, 0x20000) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={0xfff, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e23, @rand_addr=0x1000}, {0x2, 0x4e23, @loopback}, 0x20, 0x5, 0x2, 0xfffffffffffffffe, 0xfffffffffffffffb, &(0x7f0000000140)='nr0\x00', 0x7, 0x4}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000280), &(0x7f00000002c0)=0x30) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x400, 0x80000) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 280.705466] EXT4-fs (loop2): invalid inodes per group: 16384 [ 280.705466] [ 280.727347] FAULT_INJECTION: forcing a failure. [ 280.727347] name failslab, interval 1, probability 0, space 0, times 0 [ 280.766063] CPU: 1 PID: 11880 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 280.766460] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 280.774586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.774592] Call Trace: [ 280.774621] dump_stack+0x244/0x3ab [ 280.774660] ? dump_stack_print_info.cold.2+0x52/0x52 [ 280.774688] should_fail.cold.4+0xa/0x17 [ 280.774708] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.774736] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 280.774757] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 280.774781] ? is_bpf_text_address+0xac/0x170 [ 280.794153] ? lock_downgrade+0x900/0x900 [ 280.802957] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 280.802972] ? kasan_check_read+0x11/0x20 [ 280.802991] ? fs_reclaim_acquire+0x20/0x20 [ 280.803008] ? lock_downgrade+0x900/0x900 [ 280.803028] ? expand_files.part.8+0x571/0x9a0 [ 280.852771] ? perf_trace_sched_process_exec+0x860/0x860 [ 280.858228] ? iterate_fd+0x4b0/0x4b0 [ 280.862031] ? __save_stack_trace+0x8d/0xf0 [ 280.866358] __should_failslab+0x124/0x180 [ 280.870593] should_failslab+0x9/0x14 [ 280.874396] kmem_cache_alloc+0x2be/0x730 [ 280.878552] ? shmem_destroy_callback+0xc0/0xc0 [ 280.883228] shmem_alloc_inode+0x1b/0x40 [ 280.887487] alloc_inode+0x63/0x190 [ 280.891116] new_inode_pseudo+0x71/0x1a0 [ 280.895187] ? prune_icache_sb+0x1c0/0x1c0 [ 280.899431] ? _raw_spin_unlock+0x2c/0x50 [ 280.903583] new_inode+0x1c/0x40 [ 280.906959] shmem_get_inode+0xf1/0x920 [ 280.910937] ? shmem_encode_fh+0x340/0x340 [ 280.915172] ? lock_downgrade+0x900/0x900 [ 280.919331] ? lock_release+0xa10/0xa10 [ 280.923303] ? perf_trace_sched_process_exec+0x860/0x860 [ 280.928757] ? usercopy_warn+0x110/0x110 [ 280.932827] __shmem_file_setup.part.50+0x83/0x2a0 [ 280.937761] shmem_file_setup+0x65/0x90 [ 280.941737] __x64_sys_memfd_create+0x2af/0x4f0 [ 280.946406] ? memfd_fcntl+0x18b0/0x18b0 [ 280.950478] do_syscall_64+0x1b9/0x820 [ 280.954368] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 280.959735] ? syscall_return_slowpath+0x5e0/0x5e0 [ 280.964670] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.969518] ? trace_hardirqs_on_caller+0x310/0x310 [ 280.974535] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 280.979554] ? prepare_exit_to_usermode+0x291/0x3b0 [ 280.984573] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.989418] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.994602] RIP: 0033:0x457519 [ 280.997795] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.016701] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 281.024415] RAX: ffffffffffffffda RBX: 0000000020001800 RCX: 0000000000457519 [ 281.031681] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 281.038953] RBP: 000000000072bf00 R08: 0000000000000820 R09: 00000000fbad8001 [ 281.046219] R10: 0000000020001800 R11: 0000000000000246 R12: 00007efcb5aed6d4 [ 281.053483] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 12:55:24 executing program 1 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:24 executing program 4 (fault-call:4 fault-nth:2): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x4002000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 281.066237] EXT4-fs (loop2): invalid inodes per group: 16384 [ 281.066237] 12:55:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) socket$unix(0x1, 0x5, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x4000, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000280)) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x900) setsockopt$inet6_int(r2, 0x29, 0x11, &(0x7f0000000200)=0x1, 0x4) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000140)={0xf733, 0x4, [0x5]}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0xfffffffffffffd11) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x100, 0x0) [ 281.185392] FAULT_INJECTION: forcing a failure. [ 281.185392] name failslab, interval 1, probability 0, space 0, times 0 [ 281.227197] FAULT_INJECTION: forcing a failure. [ 281.227197] name failslab, interval 1, probability 0, space 0, times 0 [ 281.246510] CPU: 0 PID: 11894 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 281.255050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.264420] Call Trace: [ 281.267028] dump_stack+0x244/0x3ab [ 281.270690] ? dump_stack_print_info.cold.2+0x52/0x52 [ 281.275910] should_fail.cold.4+0xa/0x17 [ 281.279995] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.285204] ? __kernel_text_address+0xd/0x40 [ 281.289713] ? unwind_get_return_address+0x61/0xa0 [ 281.294667] ? __save_stack_trace+0x8d/0xf0 [ 281.299023] ? save_stack+0xa9/0xd0 [ 281.302683] ? __lockdep_init_map+0x105/0x590 [ 281.307196] ? kasan_kmalloc+0xc7/0xe0 [ 281.311099] ? lockdep_init_map+0x9/0x10 [ 281.315179] ? fs_reclaim_acquire+0x20/0x20 [ 281.319567] ? lock_downgrade+0x900/0x900 [ 281.323752] ? perf_trace_sched_process_exec+0x860/0x860 [ 281.329216] ? lock_release+0xa10/0xa10 [ 281.333222] __should_failslab+0x124/0x180 [ 281.337486] should_failslab+0x9/0x14 [ 281.341291] kmem_cache_alloc+0x2be/0x730 [ 281.345445] ? mpol_shared_policy_init+0x235/0x650 [ 281.350379] ? current_time+0x72/0x1b0 [ 281.354272] __d_alloc+0xc8/0xb90 [ 281.357737] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 281.362760] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 281.367781] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 281.372976] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.378515] ? timespec64_trunc+0xea/0x180 [ 281.382753] ? inode_init_owner+0x340/0x340 [ 281.387082] ? _raw_spin_unlock+0x2c/0x50 [ 281.391234] ? current_time+0x10b/0x1b0 [ 281.395213] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.400754] ? check_preemption_disabled+0x48/0x200 [ 281.406186] ? __lockdep_init_map+0x105/0x590 [ 281.410697] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 281.416236] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 281.421777] d_alloc_pseudo+0x1d/0x30 [ 281.425581] alloc_file_pseudo+0x158/0x3f0 [ 281.429992] ? alloc_file+0x4d0/0x4d0 [ 281.433800] ? usercopy_warn+0x110/0x110 [ 281.437873] __shmem_file_setup.part.50+0x110/0x2a0 [ 281.442894] shmem_file_setup+0x65/0x90 [ 281.446871] __x64_sys_memfd_create+0x2af/0x4f0 [ 281.451546] ? memfd_fcntl+0x18b0/0x18b0 [ 281.455627] do_syscall_64+0x1b9/0x820 [ 281.459523] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 281.464895] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.469824] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.474674] ? trace_hardirqs_on_caller+0x310/0x310 [ 281.479752] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 281.484772] ? prepare_exit_to_usermode+0x291/0x3b0 [ 281.489795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.494655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.499852] RIP: 0033:0x457519 [ 281.503047] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:55:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x3400000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 281.521950] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 281.529671] RAX: ffffffffffffffda RBX: 0000000020001800 RCX: 0000000000457519 [ 281.536948] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 281.545217] RBP: 000000000072bf00 R08: 0000000000000820 R09: 00000000fbad8001 [ 281.552482] R10: 0000000020001800 R11: 0000000000000246 R12: 00007efcb5aed6d4 [ 281.559754] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 [ 281.581663] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 281.586072] CPU: 1 PID: 11901 Comm: syz-executor1 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 281.597673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.607021] Call Trace: [ 281.609612] dump_stack+0x244/0x3ab [ 281.613254] ? dump_stack_print_info.cold.2+0x52/0x52 [ 281.618451] should_fail.cold.4+0xa/0x17 [ 281.622516] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.627664] ? __kernel_text_address+0xd/0x40 [ 281.632165] ? unwind_get_return_address+0x61/0xa0 [ 281.637105] ? __save_stack_trace+0x8d/0xf0 [ 281.641432] ? save_stack+0xa9/0xd0 [ 281.645063] ? __lockdep_init_map+0x105/0x590 [ 281.649554] ? kasan_kmalloc+0xc7/0xe0 [ 281.653445] ? lockdep_init_map+0x9/0x10 [ 281.657511] ? fs_reclaim_acquire+0x20/0x20 [ 281.661833] ? lock_downgrade+0x900/0x900 [ 281.665987] ? perf_trace_sched_process_exec+0x860/0x860 [ 281.671441] ? lock_release+0xa10/0xa10 [ 281.675420] __should_failslab+0x124/0x180 [ 281.679663] should_failslab+0x9/0x14 [ 281.683467] kmem_cache_alloc+0x2be/0x730 [ 281.687613] ? mpol_shared_policy_init+0x235/0x650 [ 281.692546] ? current_time+0x72/0x1b0 [ 281.696431] __d_alloc+0xc8/0xb90 [ 281.699885] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 281.704901] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 281.709914] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 281.715125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.720667] ? timespec64_trunc+0xea/0x180 [ 281.724900] ? inode_init_owner+0x340/0x340 [ 281.729224] ? _raw_spin_unlock+0x2c/0x50 [ 281.733374] ? current_time+0x10b/0x1b0 [ 281.737350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.742888] ? check_preemption_disabled+0x48/0x200 [ 281.747902] ? __lockdep_init_map+0x105/0x590 [ 281.752400] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 281.757934] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 281.763468] d_alloc_pseudo+0x1d/0x30 [ 281.767265] alloc_file_pseudo+0x158/0x3f0 [ 281.771502] ? alloc_file+0x4d0/0x4d0 [ 281.775305] ? usercopy_warn+0x110/0x110 [ 281.779378] __shmem_file_setup.part.50+0x110/0x2a0 [ 281.784396] shmem_file_setup+0x65/0x90 [ 281.788369] __x64_sys_memfd_create+0x2af/0x4f0 [ 281.793038] ? memfd_fcntl+0x18b0/0x18b0 [ 281.797106] do_syscall_64+0x1b9/0x820 [ 281.800990] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 281.806353] ? syscall_return_slowpath+0x5e0/0x5e0 [ 281.811284] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.816126] ? trace_hardirqs_on_caller+0x310/0x310 [ 281.821143] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 281.826157] ? prepare_exit_to_usermode+0x291/0x3b0 [ 281.831183] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.836029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.841213] RIP: 0033:0x457519 [ 281.844411] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.863307] RSP: 002b:00007f9f9d847a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 281.871012] RAX: ffffffffffffffda RBX: 0000000020001800 RCX: 0000000000457519 12:55:25 executing program 4 (fault-call:4 fault-nth:3): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 281.878274] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 281.885540] RBP: 000000000072bf00 R08: 0000000000000820 R09: 00000000fbad8001 [ 281.892805] R10: 0000000020001800 R11: 0000000000000246 R12: 00007f9f9d8486d4 [ 281.900068] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 [ 281.913754] EXT4-fs (loop2): invalid inodes per group: 16384 [ 281.913754] [ 281.981792] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 281.997952] FAULT_INJECTION: forcing a failure. [ 281.997952] name failslab, interval 1, probability 0, space 0, times 0 [ 282.015393] EXT4-fs (loop2): invalid inodes per group: 16384 [ 282.015393] [ 282.026528] CPU: 1 PID: 11927 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 282.035041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.044390] Call Trace: [ 282.046986] dump_stack+0x244/0x3ab [ 282.050622] ? dump_stack_print_info.cold.2+0x52/0x52 [ 282.055826] ? __save_stack_trace+0x8d/0xf0 [ 282.060242] should_fail.cold.4+0xa/0x17 [ 282.064306] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.069408] ? save_stack+0x43/0xd0 [ 282.073031] ? kasan_kmalloc+0xc7/0xe0 [ 282.076917] ? kasan_slab_alloc+0x12/0x20 [ 282.081067] ? kmem_cache_alloc+0x12e/0x730 [ 282.085384] ? __d_alloc+0xc8/0xb90 [ 282.089008] ? d_alloc_pseudo+0x1d/0x30 [ 282.092979] ? alloc_file_pseudo+0x158/0x3f0 [ 282.097386] ? shmem_file_setup+0x65/0x90 [ 282.101534] ? mark_held_locks+0x130/0x130 [ 282.105774] ? memcg_kmem_put_cache+0x1d1/0x300 [ 282.110442] ? lock_downgrade+0x900/0x900 [ 282.114590] ? lock_release+0xa10/0xa10 [ 282.118569] ? fs_reclaim_acquire+0x20/0x20 [ 282.122888] ? lock_downgrade+0x900/0x900 [ 282.127041] ? perf_trace_sched_process_exec+0x860/0x860 [ 282.132491] ? lock_downgrade+0x900/0x900 [ 282.136640] __should_failslab+0x124/0x180 [ 282.140888] should_failslab+0x9/0x14 [ 282.144695] kmem_cache_alloc+0x2be/0x730 [ 282.148846] ? d_set_d_op+0x31d/0x410 [ 282.152657] __alloc_file+0xa8/0x470 [ 282.156376] ? file_free_rcu+0xd0/0xd0 [ 282.160265] ? d_instantiate+0x79/0xa0 [ 282.164154] ? lock_downgrade+0x900/0x900 [ 282.168308] ? kasan_check_read+0x11/0x20 [ 282.172454] ? do_raw_spin_unlock+0xa7/0x2f0 [ 282.176862] ? do_raw_spin_trylock+0x270/0x270 [ 282.181443] alloc_empty_file+0x72/0x170 [ 282.185503] alloc_file+0x5e/0x4d0 [ 282.189045] ? _raw_spin_unlock+0x2c/0x50 [ 282.193196] alloc_file_pseudo+0x261/0x3f0 [ 282.197429] ? alloc_file+0x4d0/0x4d0 [ 282.201230] ? usercopy_warn+0x110/0x110 [ 282.205324] __shmem_file_setup.part.50+0x110/0x2a0 [ 282.210344] shmem_file_setup+0x65/0x90 [ 282.214322] __x64_sys_memfd_create+0x2af/0x4f0 [ 282.218990] ? memfd_fcntl+0x18b0/0x18b0 [ 282.223060] do_syscall_64+0x1b9/0x820 [ 282.226945] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.232309] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.237239] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.242082] ? trace_hardirqs_on_caller+0x310/0x310 [ 282.247098] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 282.252120] ? prepare_exit_to_usermode+0x291/0x3b0 [ 282.257137] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.261983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.267171] RIP: 0033:0x457519 12:55:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x18000000000000) 12:55:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000680)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@rand_addr}}, &(0x7f0000000780)=0xe8) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0x5, 0x2, &(0x7f0000000640)=[{&(0x7f00000004c0)="251ddb9a2f4637a8676a483ef718c332246c5edbd98be6cf371d8fb1a1c759df8ac890d81e15284cc7a363684b4ba30b9508ba7dd14a32e6077b2ee7b24e7cb0b93ec08dc631a5b537105648f39d3fe57544ffeb613d69d916f91f5ea7ce878830f7ae4f0f909e5e77b8f57a49f8e886584e3b9bb1", 0x75, 0x7}, {&(0x7f0000000540)="6106526e8ee856263da67e6725f40f65fcd84ab22be832af4ba849431e8ee662a07bd59935882271f022478175baeaa140a28fc754ed4b05b2f60f07c9cd6edaff617d7e0dd19e864f97f683420d62b408aea724c4dab001ba02bdfa810cc8d185827149fb47125f7452dd71e76c43af52237c6803defedb0d99ea668a257b207e037af1a2409bc42e8b693ebbaef2c300533b77e139260e20faec54665cd11ba2885f8eca1315b395bb0f604eae98541d60dcf380618dc5aff1b029155aaf6c8e1140fcc66d666ae55a5f80ed91a6aa707bb82a10b0e306c93811", 0xdb, 0x7fffffff}], 0x800000, &(0x7f00000007c0)={[{@uni_xlateno='uni_xlate=0'}, {@numtail='nonumtail=0'}], [{@fowner_gt={'fowner>', r0}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@dont_hash='dont_hash'}]}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) ioprio_set$uid(0x3, r2, 0x3a) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000002c0)="7bc46cbe149aa1d6c535d7d29a00c8930b0925c6f558bad85eb06889154e078a2a7b88c96aae60f7a4453b71e03eba24dd5082f0b6d2b82a3a7153edd610c7b8c41f3c1c1d78db7e299b1a6205dd5e4dfd2c9cdd3488eedc38fdee60a333b89c7e09af4351fac94a454fc6ab31ca179107b7d239542b2073ae922d8e9ce3378ff3feb3ea8eba4c7b6dee0bd2bacb10bf000000000000000000000000", 0x9c) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') write$FUSE_LSEEK(r3, &(0x7f0000000100)={0x18, 0xfffffffffffffff5, 0x1, {0xfffffffffffffffd}}, 0x18) getsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000140), &(0x7f0000000200)=0x4) 12:55:25 executing program 1 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 282.270373] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.289267] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 282.296974] RAX: ffffffffffffffda RBX: 0000000020001800 RCX: 0000000000457519 [ 282.304237] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 282.311503] RBP: 000000000072bf00 R08: 0000000000000820 R09: 00000000fbad8001 [ 282.318767] R10: 0000000020001800 R11: 0000000000000246 R12: 00007efcb5aed6d4 [ 282.326032] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 [ 282.377038] FAT-fs (loop3): Unrecognized mount option "fowner>00000000000000000000" or missing value [ 282.396227] FAULT_INJECTION: forcing a failure. [ 282.396227] name failslab, interval 1, probability 0, space 0, times 0 [ 282.441446] CPU: 0 PID: 11941 Comm: syz-executor1 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 282.449973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.459334] Call Trace: [ 282.461940] dump_stack+0x244/0x3ab [ 282.465589] ? dump_stack_print_info.cold.2+0x52/0x52 [ 282.470808] ? debug_smp_processor_id+0x1c/0x20 [ 282.475497] ? perf_trace_lock+0x14d/0x7a0 [ 282.479751] should_fail.cold.4+0xa/0x17 [ 282.483823] ? fault_create_debugfs_attr+0x1f0/0x1f0 12:55:25 executing program 4 (fault-call:4 fault-nth:4): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x1500}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 282.488938] ? save_stack+0x43/0xd0 [ 282.492576] ? kasan_kmalloc+0xc7/0xe0 [ 282.496478] ? kasan_slab_alloc+0x12/0x20 [ 282.500651] ? lock_is_held_type+0x210/0x210 [ 282.505078] ? mark_held_locks+0x130/0x130 [ 282.509330] ? memcg_kmem_put_cache+0x1d1/0x300 [ 282.514021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.519579] ? lock_is_held_type+0x210/0x210 [ 282.524004] ? fs_reclaim_acquire+0x20/0x20 [ 282.528342] ? lock_downgrade+0x900/0x900 [ 282.532507] ? perf_trace_sched_process_exec+0x860/0x860 12:55:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2-', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 282.538240] ? lock_downgrade+0x900/0x900 [ 282.538264] __should_failslab+0x124/0x180 [ 282.538284] should_failslab+0x9/0x14 [ 282.550462] kmem_cache_alloc+0x2be/0x730 [ 282.550484] ? d_set_d_op+0x31d/0x410 [ 282.558430] __alloc_file+0xa8/0x470 [ 282.562152] ? lock_is_held_type+0x210/0x210 [ 282.562167] ? file_free_rcu+0xd0/0xd0 [ 282.562185] ? d_instantiate+0x79/0xa0 [ 282.562201] ? lock_downgrade+0x900/0x900 [ 282.562223] ? kasan_check_read+0x11/0x20 [ 282.570502] ? do_raw_spin_unlock+0xa7/0x2f0 [ 282.570517] ? do_raw_spin_trylock+0x270/0x270 [ 282.570534] alloc_empty_file+0x72/0x170 [ 282.595750] alloc_file+0x5e/0x4d0 [ 282.599304] ? _raw_spin_unlock+0x2c/0x50 [ 282.603475] alloc_file_pseudo+0x261/0x3f0 [ 282.607726] ? alloc_file+0x4d0/0x4d0 [ 282.611547] ? usercopy_warn+0x110/0x110 [ 282.615634] __shmem_file_setup.part.50+0x110/0x2a0 [ 282.620687] shmem_file_setup+0x65/0x90 [ 282.624683] __x64_sys_memfd_create+0x2af/0x4f0 [ 282.629355] ? memfd_fcntl+0x18b0/0x18b0 [ 282.633427] do_syscall_64+0x1b9/0x820 [ 282.637316] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 282.642688] ? syscall_return_slowpath+0x5e0/0x5e0 [ 282.647617] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.652471] ? trace_hardirqs_on_caller+0x310/0x310 [ 282.657491] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 282.662511] ? prepare_exit_to_usermode+0x291/0x3b0 [ 282.667541] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.672393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.677587] RIP: 0033:0x457519 [ 282.680783] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.699702] RSP: 002b:00007f9f9d847a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 282.707417] RAX: ffffffffffffffda RBX: 0000000020001800 RCX: 0000000000457519 [ 282.714693] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 282.721960] RBP: 000000000072bf00 R08: 0000000000000820 R09: 00000000fbad8001 [ 282.729229] R10: 0000000020001800 R11: 0000000000000246 R12: 00007f9f9d8486d4 [ 282.736496] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 12:55:25 executing program 1 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 282.773015] FAT-fs (loop3): Unrecognized mount option "fowner>00000000000000000000" or missing value [ 282.797218] FAULT_INJECTION: forcing a failure. [ 282.797218] name failslab, interval 1, probability 0, space 0, times 0 [ 282.835363] CPU: 0 PID: 11953 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 282.843910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.853269] Call Trace: [ 282.855892] dump_stack+0x244/0x3ab [ 282.859552] ? dump_stack_print_info.cold.2+0x52/0x52 [ 282.864760] ? debug_smp_processor_id+0x1c/0x20 [ 282.869482] ? perf_trace_lock+0x14d/0x7a0 [ 282.873741] should_fail.cold.4+0xa/0x17 [ 282.877810] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.882927] ? is_bpf_text_address+0xd3/0x170 [ 282.887429] ? kernel_text_address+0x79/0xf0 [ 282.891849] ? __kernel_text_address+0xd/0x40 [ 282.896345] ? unwind_get_return_address+0x61/0xa0 [ 282.901276] ? __save_stack_trace+0x8d/0xf0 [ 282.905606] ? lock_is_held_type+0x210/0x210 [ 282.910016] ? fs_reclaim_acquire+0x20/0x20 [ 282.914339] ? lock_downgrade+0x900/0x900 [ 282.918486] ? kasan_slab_alloc+0x12/0x20 [ 282.922635] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 282.927491] ? perf_trace_sched_process_exec+0x860/0x860 [ 282.932941] ? lock_is_held_type+0x210/0x210 [ 282.937353] __should_failslab+0x124/0x180 [ 282.941591] should_failslab+0x9/0x14 [ 282.945396] kmem_cache_alloc_trace+0x2d7/0x750 [ 282.950063] ? __might_sleep+0x95/0x190 [ 282.954043] apparmor_file_alloc_security+0x17b/0xac0 [ 282.959237] ? apparmor_path_rename+0xcd0/0xcd0 [ 282.963903] ? kasan_kmalloc+0xc7/0xe0 [ 282.967793] ? kasan_slab_alloc+0x12/0x20 [ 282.971944] ? kmem_cache_alloc+0x306/0x730 [ 282.976263] ? d_set_d_op+0x31d/0x410 [ 282.980064] security_file_alloc+0x4c/0xa0 [ 282.984301] __alloc_file+0x12a/0x470 [ 282.988105] ? lock_is_held_type+0x1d0/0x210 [ 282.992513] ? file_free_rcu+0xd0/0xd0 [ 282.996400] ? d_instantiate+0x79/0xa0 [ 283.000286] ? lock_downgrade+0x900/0x900 [ 283.004435] ? kasan_check_read+0x11/0x20 [ 283.008583] ? do_raw_spin_unlock+0xa7/0x2f0 [ 283.012989] ? do_raw_spin_trylock+0x270/0x270 [ 283.017576] alloc_empty_file+0x72/0x170 [ 283.021655] alloc_file+0x5e/0x4d0 [ 283.025207] ? _raw_spin_unlock+0x2c/0x50 [ 283.029354] alloc_file_pseudo+0x261/0x3f0 [ 283.033589] ? alloc_file+0x4d0/0x4d0 [ 283.037390] ? usercopy_warn+0x110/0x110 [ 283.041482] __shmem_file_setup.part.50+0x110/0x2a0 [ 283.046502] shmem_file_setup+0x65/0x90 [ 283.050479] __x64_sys_memfd_create+0x2af/0x4f0 [ 283.055149] ? memfd_fcntl+0x18b0/0x18b0 [ 283.059219] do_syscall_64+0x1b9/0x820 [ 283.063105] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.068470] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.073402] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.078250] ? trace_hardirqs_on_caller+0x310/0x310 [ 283.083267] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 283.088283] ? prepare_exit_to_usermode+0x291/0x3b0 [ 283.093301] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.098147] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.103336] RIP: 0033:0x457519 [ 283.106534] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.125439] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 12:55:26 executing program 4 (fault-call:4 fault-nth:5): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 283.133151] RAX: ffffffffffffffda RBX: 0000000020001800 RCX: 0000000000457519 [ 283.140416] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 283.147690] RBP: 000000000072bf00 R08: 0000000000000820 R09: 00000000fbad8001 [ 283.154959] R10: 0000000020001800 R11: 0000000000000246 R12: 00007efcb5aed6d4 [ 283.162223] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 12:55:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cts(ctr(des3_ede))\x00'}, 0x58) [ 283.218772] FAULT_INJECTION: forcing a failure. [ 283.218772] name failslab, interval 1, probability 0, space 0, times 0 [ 283.271182] CPU: 0 PID: 11964 Comm: syz-executor1 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 283.279729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.289094] Call Trace: [ 283.291718] dump_stack+0x244/0x3ab [ 283.295366] ? dump_stack_print_info.cold.2+0x52/0x52 [ 283.300575] ? lock_downgrade+0x900/0x900 [ 283.304744] should_fail.cold.4+0xa/0x17 [ 283.308824] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 283.314113] ? fault_create_debugfs_attr+0x1f0/0x1f0 12:55:26 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x201000000) 12:55:26 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 283.319228] ? is_bpf_text_address+0xd3/0x170 [ 283.323738] ? kernel_text_address+0x79/0xf0 [ 283.328161] ? __kernel_text_address+0xd/0x40 [ 283.332684] ? unwind_get_return_address+0x61/0xa0 [ 283.337630] ? __save_stack_trace+0x8d/0xf0 [ 283.341998] ? fs_reclaim_acquire+0x20/0x20 [ 283.346337] ? lock_downgrade+0x900/0x900 [ 283.350493] ? kasan_slab_alloc+0x12/0x20 [ 283.350753] FAULT_INJECTION: forcing a failure. [ 283.350753] name failslab, interval 1, probability 0, space 0, times 0 [ 283.354663] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 283.354688] ? perf_trace_sched_process_exec+0x860/0x860 [ 283.354713] __should_failslab+0x124/0x180 [ 283.354740] should_failslab+0x9/0x14 [ 283.384238] kmem_cache_alloc_trace+0x2d7/0x750 [ 283.388916] ? __might_sleep+0x95/0x190 [ 283.392902] apparmor_file_alloc_security+0x17b/0xac0 [ 283.398111] ? apparmor_path_rename+0xcd0/0xcd0 [ 283.403239] ? kasan_kmalloc+0xc7/0xe0 [ 283.407136] ? kasan_slab_alloc+0x12/0x20 [ 283.411294] ? kmem_cache_alloc+0x306/0x730 [ 283.415624] ? d_set_d_op+0x31d/0x410 [ 283.419445] security_file_alloc+0x4c/0xa0 [ 283.423699] __alloc_file+0x12a/0x470 [ 283.427502] ? file_free_rcu+0xd0/0xd0 [ 283.431396] ? d_instantiate+0x79/0xa0 [ 283.435292] ? lock_downgrade+0x900/0x900 [ 283.439454] ? kasan_check_read+0x11/0x20 [ 283.443603] ? do_raw_spin_unlock+0xa7/0x2f0 [ 283.448013] ? do_raw_spin_trylock+0x270/0x270 [ 283.452600] alloc_empty_file+0x72/0x170 [ 283.456675] alloc_file+0x5e/0x4d0 [ 283.460235] ? _raw_spin_unlock+0x2c/0x50 [ 283.464393] alloc_file_pseudo+0x261/0x3f0 [ 283.468634] ? alloc_file+0x4d0/0x4d0 [ 283.472464] ? usercopy_warn+0x110/0x110 [ 283.476544] __shmem_file_setup.part.50+0x110/0x2a0 [ 283.481575] shmem_file_setup+0x65/0x90 [ 283.485560] __x64_sys_memfd_create+0x2af/0x4f0 [ 283.490267] ? memfd_fcntl+0x18b0/0x18b0 [ 283.494344] do_syscall_64+0x1b9/0x820 [ 283.498236] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.503613] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.508557] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.513411] ? trace_hardirqs_on_caller+0x310/0x310 [ 283.518438] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 283.523464] ? prepare_exit_to_usermode+0x291/0x3b0 [ 283.528488] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.533349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.538540] RIP: 0033:0x457519 [ 283.541742] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.560690] RSP: 002b:00007f9f9d847a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 283.568408] RAX: ffffffffffffffda RBX: 0000000020001800 RCX: 0000000000457519 [ 283.575692] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc74a [ 283.582970] RBP: 000000000072bf00 R08: 0000000000000820 R09: 00000000fbad8001 [ 283.590243] R10: 0000000020001800 R11: 0000000000000246 R12: 00007f9f9d8486d4 [ 283.597513] R13: 00000000004c49d1 R14: 00000000004d7d28 R15: 0000000000000003 [ 283.604808] CPU: 1 PID: 11977 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 283.613321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.622685] Call Trace: [ 283.625285] dump_stack+0x244/0x3ab [ 283.628921] ? dump_stack_print_info.cold.2+0x52/0x52 [ 283.634124] ? debug_smp_processor_id+0x1c/0x20 [ 283.638820] ? perf_trace_lock+0x14d/0x7a0 [ 283.643092] should_fail.cold.4+0xa/0x17 [ 283.647158] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.652273] ? shmem_setattr+0x50e/0xda0 [ 283.656341] ? lock_downgrade+0x900/0x900 [ 283.660516] ? current_time+0x72/0x1b0 [ 283.664413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.669957] ? check_preemption_disabled+0x48/0x200 [ 283.674986] ? debug_smp_processor_id+0x1c/0x20 [ 283.679685] ? perf_trace_lock+0x14d/0x7a0 [ 283.683943] ? fsnotify+0x4e5/0xf10 [ 283.687581] ? lock_is_held_type+0x210/0x210 [ 283.691996] ? fs_reclaim_acquire+0x20/0x20 [ 283.696325] ? lock_downgrade+0x900/0x900 [ 283.700478] ? perf_trace_sched_process_exec+0x860/0x860 [ 283.705936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.711507] __should_failslab+0x124/0x180 [ 283.715746] should_failslab+0x9/0x14 [ 283.719549] kmem_cache_alloc+0x2be/0x730 [ 283.723706] ? do_sys_ftruncate+0x428/0x550 [ 283.728036] ? lock_downgrade+0x900/0x900 [ 283.732195] getname_flags+0xd0/0x590 [ 283.736006] getname+0x19/0x20 [ 283.739204] do_sys_open+0x383/0x700 [ 283.742930] ? filp_open+0x80/0x80 [ 283.746479] ? trace_hardirqs_off_caller+0x300/0x300 [ 283.751582] ? do_sys_ftruncate+0x449/0x550 [ 283.755926] __x64_sys_open+0x7e/0xc0 [ 283.759735] do_syscall_64+0x1b9/0x820 [ 283.763630] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 283.769005] ? syscall_return_slowpath+0x5e0/0x5e0 [ 283.773940] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.778789] ? trace_hardirqs_on_caller+0x310/0x310 [ 283.783808] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 283.788831] ? prepare_exit_to_usermode+0x291/0x3b0 [ 283.793856] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.798711] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.803903] RIP: 0033:0x411171 12:55:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="65787432ff", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 283.807104] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 283.826011] RSP: 002b:00007efcb5aeca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 283.833728] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000411171 [ 283.841024] RDX: 00007efcb5aecafa RSI: 0000000000000002 RDI: 00007efcb5aecaf0 [ 283.848296] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 283.855570] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 283.862841] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:26 executing program 1 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xffffffffa0008000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./control\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x1}, [{}], "", [[]]}, 0x158) userfaultfd(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)}}, 0x20) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x9}, &(0x7f0000000140)=0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x1de, 0xfc, &(0x7f0000001180)="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", &(0x7f0000000340)=""/252}, 0x28) unshare(0x0) creat(&(0x7f0000000000)='./control/file0\x00', 0x0) unlink(&(0x7f0000000200)='./control/file0\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) bind$alg(r1, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r2 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0xfffffffff484d1c9, 0x539040) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in={{0x2, 0x4e21, @multicast1}}, [0x100000001, 0x8, 0x401, 0x9, 0x1000, 0x7c, 0x0, 0x401, 0x9, 0xffffffffffffff80, 0x6, 0x80000001, 0x100000001, 0xedc7, 0x8]}, &(0x7f00000003c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000400)={0x0, 0xfffffffffffffff9, 0x2, 0x1, 0x101, 0x10001, 0x4, 0xdae, r3}, 0x20) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:27 executing program 4 (fault-call:4 fault-nth:6): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 283.979847] FAULT_INJECTION: forcing a failure. [ 283.979847] name failslab, interval 1, probability 0, space 0, times 0 [ 284.033585] CPU: 0 PID: 11995 Comm: syz-executor1 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 284.042152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.051522] Call Trace: [ 284.054137] dump_stack+0x244/0x3ab [ 284.057786] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.062999] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 284.067947] should_fail.cold.4+0xa/0x17 [ 284.072028] ? current_time+0x72/0x1b0 [ 284.075926] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.081054] ? shmem_setattr+0x50e/0xda0 [ 284.085132] ? lock_downgrade+0x900/0x900 [ 284.089286] ? current_time+0x72/0x1b0 [ 284.093188] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.098745] ? timespec64_trunc+0xea/0x180 [ 284.103161] ? inode_init_owner+0x340/0x340 [ 284.107511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.113083] ? fsnotify+0x4e5/0xf10 [ 284.116733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.122288] ? fs_reclaim_acquire+0x20/0x20 [ 284.126622] ? lock_downgrade+0x900/0x900 [ 284.130813] ? perf_trace_sched_process_exec+0x860/0x860 [ 284.136280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.141859] __should_failslab+0x124/0x180 [ 284.146126] should_failslab+0x9/0x14 [ 284.149956] kmem_cache_alloc+0x2be/0x730 [ 284.154148] ? do_sys_ftruncate+0x428/0x550 [ 284.158483] ? lock_downgrade+0x900/0x900 [ 284.162661] getname_flags+0xd0/0x590 [ 284.166482] getname+0x19/0x20 [ 284.169704] do_sys_open+0x383/0x700 [ 284.173433] ? filp_open+0x80/0x80 [ 284.176989] ? trace_hardirqs_off_caller+0x300/0x300 [ 284.182103] ? do_sys_ftruncate+0x449/0x550 [ 284.186438] __x64_sys_open+0x7e/0xc0 [ 284.190257] do_syscall_64+0x1b9/0x820 [ 284.194162] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.199542] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.204485] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.209341] ? trace_hardirqs_on_caller+0x310/0x310 [ 284.214362] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 284.219386] ? prepare_exit_to_usermode+0x291/0x3b0 [ 284.224450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.229325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.234530] RIP: 0033:0x411171 [ 284.237733] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 284.256677] RSP: 002b:00007f9f9d847a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 284.264415] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000411171 [ 284.271695] RDX: 00007f9f9d847afa RSI: 0000000000000002 RDI: 00007f9f9d847af0 12:55:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x600700) 12:55:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xf7efffff00000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 284.278975] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 284.286271] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 284.293549] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:27 executing program 1 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 284.366759] FAULT_INJECTION: forcing a failure. [ 284.366759] name failslab, interval 1, probability 0, space 0, times 0 [ 284.405727] FAULT_INJECTION: forcing a failure. [ 284.405727] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 284.417587] CPU: 1 PID: 12027 Comm: syz-executor1 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 284.426087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.435444] Call Trace: [ 284.438044] dump_stack+0x244/0x3ab [ 284.441710] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.446918] should_fail.cold.4+0xa/0x17 [ 284.450987] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.456097] ? kasan_slab_alloc+0x12/0x20 [ 284.460258] ? mark_held_locks+0x130/0x130 [ 284.464506] ? mark_held_locks+0x130/0x130 [ 284.468754] ? is_bpf_text_address+0xac/0x170 [ 284.473260] ? lock_downgrade+0x900/0x900 [ 284.477424] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 284.482380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.487939] ? should_fail+0x22d/0xd01 [ 284.491832] ? current_time+0x72/0x1b0 [ 284.495737] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.500860] __alloc_pages_nodemask+0x34b/0xdd0 [ 284.505554] ? current_time+0x72/0x1b0 [ 284.509467] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 284.514490] ? inode_init_owner+0x340/0x340 [ 284.518905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.524454] ? fsnotify+0x4e5/0xf10 [ 284.528091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.533635] ? fs_reclaim_acquire+0x20/0x20 [ 284.538426] ? lock_downgrade+0x900/0x900 [ 284.542588] ? trace_hardirqs_off+0xb8/0x310 [ 284.547008] cache_grow_begin+0xa5/0x8c0 [ 284.551077] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 284.556622] ? check_preemption_disabled+0x48/0x200 [ 284.561674] kmem_cache_alloc+0x66b/0x730 [ 284.565846] ? do_sys_ftruncate+0x428/0x550 [ 284.570194] getname_flags+0xd0/0x590 [ 284.574010] getname+0x19/0x20 [ 284.577222] do_sys_open+0x383/0x700 [ 284.580949] ? filp_open+0x80/0x80 [ 284.584501] ? trace_hardirqs_off_caller+0x300/0x300 [ 284.589620] ? do_sys_ftruncate+0x449/0x550 [ 284.593969] __x64_sys_open+0x7e/0xc0 [ 284.597782] do_syscall_64+0x1b9/0x820 [ 284.601693] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.607074] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.612021] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:55:27 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x800000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 284.616881] ? trace_hardirqs_on_caller+0x310/0x310 [ 284.621914] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 284.626947] ? prepare_exit_to_usermode+0x291/0x3b0 [ 284.631983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.636845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.642038] RIP: 0033:0x411171 [ 284.645238] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 284.664149] RSP: 002b:00007f9f9d847a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 284.671876] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000411171 [ 284.679158] RDX: 00007f9f9d847afa RSI: 0000000000000002 RDI: 00007f9f9d847af0 [ 284.686445] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 284.693717] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 284.700991] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:27 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000100)=0x12, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x800) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000200)={0x0, {{0x2, 0x4e20, @loopback}}}, 0x88) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 284.711329] CPU: 1 PID: 12024 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 284.719846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.729203] Call Trace: [ 284.729228] dump_stack+0x244/0x3ab [ 284.729243] ? dump_stack_print_info.cold.2+0x52/0x52 [ 284.729258] ? mark_held_locks+0x130/0x130 [ 284.729275] should_fail.cold.4+0xa/0x17 [ 284.729292] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 284.729311] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.758815] ? is_bpf_text_address+0xac/0x170 [ 284.763328] ? lock_downgrade+0x900/0x900 [ 284.767498] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 284.772444] ? kasan_check_read+0x11/0x20 [ 284.776607] ? mark_held_locks+0x130/0x130 [ 284.780852] ? fs_reclaim_acquire+0x20/0x20 [ 284.785191] ? lock_downgrade+0x900/0x900 [ 284.789350] ? perf_trace_sched_process_exec+0x860/0x860 [ 284.794802] ? mark_held_locks+0x130/0x130 [ 284.799055] __should_failslab+0x124/0x180 [ 284.803296] should_failslab+0x9/0x14 [ 284.807105] kmem_cache_alloc+0x2be/0x730 [ 284.811254] ? mark_held_locks+0x130/0x130 [ 284.815495] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 284.820345] __alloc_file+0xa8/0x470 [ 284.827017] ? file_free_rcu+0xd0/0xd0 [ 284.830908] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 284.835927] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 284.840711] ? is_bpf_text_address+0xac/0x170 [ 284.845213] ? lock_downgrade+0x900/0x900 [ 284.849362] alloc_empty_file+0x72/0x170 [ 284.853425] path_openat+0x170/0x5150 [ 284.857234] ? rcu_softirq_qs+0x20/0x20 [ 284.861209] ? unwind_dump+0x190/0x190 [ 284.865103] ? is_bpf_text_address+0xd3/0x170 [ 284.869599] ? kernel_text_address+0x79/0xf0 [ 284.874017] ? path_lookupat.isra.43+0xc00/0xc00 [ 284.878786] ? unwind_get_return_address+0x61/0xa0 [ 284.883716] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 284.888736] ? expand_files.part.8+0x571/0x9a0 [ 284.893325] ? iterate_fd+0x4b0/0x4b0 [ 284.897132] ? __alloc_fd+0x347/0x6e0 [ 284.900940] ? lock_downgrade+0x900/0x900 [ 284.905090] ? getname+0x19/0x20 [ 284.908464] ? kasan_check_read+0x11/0x20 [ 284.912614] ? do_raw_spin_unlock+0xa7/0x2f0 [ 284.917031] ? do_raw_spin_trylock+0x270/0x270 [ 284.921615] ? __check_object_size+0xb1/0x782 [ 284.926127] ? _raw_spin_unlock+0x2c/0x50 [ 284.930280] ? __alloc_fd+0x347/0x6e0 [ 284.934093] do_filp_open+0x255/0x380 [ 284.937892] ? may_open_dev+0x100/0x100 [ 284.941888] ? get_unused_fd_flags+0x122/0x1a0 [ 284.946476] ? __alloc_fd+0x6e0/0x6e0 [ 284.950287] do_sys_open+0x568/0x700 [ 284.954004] ? filp_open+0x80/0x80 [ 284.957552] ? trace_hardirqs_off_caller+0x300/0x300 [ 284.962665] ? do_sys_ftruncate+0x449/0x550 [ 284.967005] __x64_sys_open+0x7e/0xc0 [ 284.970815] do_syscall_64+0x1b9/0x820 [ 284.974710] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 284.980085] ? syscall_return_slowpath+0x5e0/0x5e0 [ 284.985022] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.989871] ? trace_hardirqs_on_caller+0x310/0x310 [ 284.994892] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 284.999915] ? prepare_exit_to_usermode+0x291/0x3b0 [ 285.004943] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.009812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.015001] RIP: 0033:0x411171 [ 285.018203] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 285.037135] RSP: 002b:00007efcb5aeca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 285.044862] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000411171 [ 285.052133] RDX: 00007efcb5aecafa RSI: 0000000000000002 RDI: 00007efcb5aecaf0 [ 285.059409] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 12:55:28 executing program 4 (fault-call:4 fault-nth:7): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 285.066681] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 285.073950] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2H', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x112fff) [ 285.119254] EXT4-fs: 12 callbacks suppressed [ 285.119269] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 285.119269] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 285.119269] [ 285.156958] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:28 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:28 executing program 3: getpid() r0 = gettid() perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 285.209076] FAULT_INJECTION: forcing a failure. [ 285.209076] name failslab, interval 1, probability 0, space 0, times 0 [ 285.281502] CPU: 0 PID: 12055 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 285.290047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.299408] Call Trace: [ 285.302010] dump_stack+0x244/0x3ab [ 285.305660] ? dump_stack_print_info.cold.2+0x52/0x52 [ 285.310865] ? mark_held_locks+0x130/0x130 [ 285.315111] should_fail.cold.4+0xa/0x17 [ 285.319179] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 285.323947] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 285.329062] ? is_bpf_text_address+0xac/0x170 [ 285.333563] ? lock_downgrade+0x900/0x900 [ 285.337721] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 285.342694] ? kasan_check_read+0x11/0x20 [ 285.346855] ? mark_held_locks+0x130/0x130 [ 285.351102] ? fs_reclaim_acquire+0x20/0x20 [ 285.355424] ? lock_downgrade+0x900/0x900 [ 285.359581] ? perf_trace_sched_process_exec+0x860/0x860 [ 285.365037] ? mark_held_locks+0x130/0x130 [ 285.369280] __should_failslab+0x124/0x180 [ 285.373516] should_failslab+0x9/0x14 [ 285.377317] kmem_cache_alloc+0x2be/0x730 [ 285.381475] ? mark_held_locks+0x130/0x130 [ 285.385718] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 285.390564] __alloc_file+0xa8/0x470 [ 285.394279] ? file_free_rcu+0xd0/0xd0 [ 285.398172] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 285.404740] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 285.409507] ? is_bpf_text_address+0xac/0x170 [ 285.414008] ? lock_downgrade+0x900/0x900 [ 285.418159] alloc_empty_file+0x72/0x170 [ 285.422237] path_openat+0x170/0x5150 [ 285.426054] ? rcu_softirq_qs+0x20/0x20 [ 285.430033] ? unwind_dump+0x190/0x190 [ 285.433932] ? is_bpf_text_address+0xd3/0x170 [ 285.438430] ? kernel_text_address+0x79/0xf0 [ 285.442849] ? path_lookupat.isra.43+0xc00/0xc00 [ 285.447607] ? unwind_get_return_address+0x61/0xa0 [ 285.452544] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 285.457560] ? expand_files.part.8+0x571/0x9a0 [ 285.462155] ? iterate_fd+0x4b0/0x4b0 [ 285.465963] ? __alloc_fd+0x347/0x6e0 [ 285.469769] ? lock_downgrade+0x900/0x900 [ 285.473913] ? getname+0x19/0x20 [ 285.477280] ? kasan_check_read+0x11/0x20 [ 285.481429] ? do_raw_spin_unlock+0xa7/0x2f0 [ 285.485839] ? do_raw_spin_trylock+0x270/0x270 [ 285.490420] ? __check_object_size+0xb1/0x782 [ 285.494922] ? _raw_spin_unlock+0x2c/0x50 [ 285.499076] ? __alloc_fd+0x347/0x6e0 [ 285.502890] do_filp_open+0x255/0x380 [ 285.506695] ? may_open_dev+0x100/0x100 [ 285.510694] ? get_unused_fd_flags+0x122/0x1a0 [ 285.515274] ? __alloc_fd+0x6e0/0x6e0 [ 285.519084] do_sys_open+0x568/0x700 [ 285.522804] ? filp_open+0x80/0x80 [ 285.526345] ? trace_hardirqs_off_caller+0x300/0x300 [ 285.531444] ? do_sys_ftruncate+0x449/0x550 [ 285.535772] __x64_sys_open+0x7e/0xc0 [ 285.539583] do_syscall_64+0x1b9/0x820 [ 285.544438] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 285.549808] ? syscall_return_slowpath+0x5e0/0x5e0 [ 285.554741] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.559590] ? trace_hardirqs_on_caller+0x310/0x310 [ 285.564607] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 285.569627] ? prepare_exit_to_usermode+0x291/0x3b0 [ 285.574665] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.579521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.584710] RIP: 0033:0x411171 [ 285.587904] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 285.606810] RSP: 002b:00007efcb5aeca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 285.614533] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000411171 [ 285.621806] RDX: 00007efcb5aecafa RSI: 0000000000000002 RDI: 00007efcb5aecaf0 12:55:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xe803}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 285.629073] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 285.636347] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 285.643635] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:28 executing program 4 (fault-call:4 fault-nth:8): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x1e0060000000000) [ 285.707007] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 285.707007] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 285.707007] [ 285.745106] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4000) bind$alg(r0, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="11ab7c37c1fb77985b83fe72644f0354680748a381dfd43f2fb63fc2539b86f5f8d1574182ace0ae42550ffa20d5753e0d00ce821e3908205c5dc4ebe07ab382770c712163e1fed57c0eb18543b91c2815e9d0bf2d68c1d42659fe7637f094d2176dfb6ac10299e7c51e80c4add49656f8a7a4be70ffa97323459f362e6beac1b7349649fcd0b4b95521b1169b7d603af6431b15981e897aa0bbe51a0ae6f57370ca80f46f68762cf68a49e20000", 0x14) 12:55:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x7}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 285.809605] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 285.828075] FAULT_INJECTION: forcing a failure. [ 285.828075] name failslab, interval 1, probability 0, space 0, times 0 [ 285.848471] EXT4-fs (loop2): invalid inodes per group: 16384 [ 285.848471] [ 285.867952] CPU: 0 PID: 12088 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 285.876490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.885849] Call Trace: [ 285.885877] dump_stack+0x244/0x3ab [ 285.885903] ? dump_stack_print_info.cold.2+0x52/0x52 [ 285.885931] ? debug_smp_processor_id+0x1c/0x20 [ 285.902225] ? perf_trace_lock+0x14d/0x7a0 [ 285.906488] should_fail.cold.4+0xa/0x17 [ 285.910560] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 285.915701] ? is_bpf_text_address+0xd3/0x170 [ 285.920205] ? kernel_text_address+0x79/0xf0 [ 285.924625] ? __kernel_text_address+0xd/0x40 [ 285.929151] ? unwind_get_return_address+0x61/0xa0 [ 285.934088] ? __save_stack_trace+0x8d/0xf0 [ 285.938414] ? lock_is_held_type+0x210/0x210 [ 285.942825] ? fs_reclaim_acquire+0x20/0x20 [ 285.947146] ? lock_downgrade+0x900/0x900 [ 285.951293] ? kasan_slab_alloc+0x12/0x20 [ 285.955447] ? do_syscall_64+0x1b9/0x820 [ 285.959511] ? perf_trace_sched_process_exec+0x860/0x860 [ 285.964966] ? lock_is_held_type+0x210/0x210 [ 285.969386] __should_failslab+0x124/0x180 [ 285.973628] should_failslab+0x9/0x14 [ 285.977443] kmem_cache_alloc_trace+0x2d7/0x750 [ 285.982114] ? __might_sleep+0x95/0x190 [ 285.986101] apparmor_file_alloc_security+0x17b/0xac0 [ 285.991304] ? apparmor_path_rename+0xcd0/0xcd0 [ 285.995977] ? kasan_kmalloc+0xc7/0xe0 [ 285.999871] ? kasan_slab_alloc+0x12/0x20 [ 286.004025] ? kmem_cache_alloc+0x306/0x730 [ 286.008357] security_file_alloc+0x4c/0xa0 [ 286.012598] __alloc_file+0x12a/0x470 [ 286.016396] ? file_free_rcu+0xd0/0xd0 [ 286.020288] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 286.025333] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 286.030096] ? lock_is_held_type+0x210/0x210 [ 286.034508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.040051] ? check_preemption_disabled+0x48/0x200 [ 286.045090] alloc_empty_file+0x72/0x170 [ 286.049188] path_openat+0x170/0x5150 [ 286.052994] ? lock_is_held_type+0x210/0x210 [ 286.057400] ? unwind_dump+0x190/0x190 [ 286.061301] ? is_bpf_text_address+0xd3/0x170 [ 286.065798] ? kernel_text_address+0x79/0xf0 [ 286.070208] ? path_lookupat.isra.43+0xc00/0xc00 [ 286.074967] ? unwind_get_return_address+0x61/0xa0 [ 286.079902] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 286.084924] ? expand_files.part.8+0x571/0x9a0 [ 286.089508] ? iterate_fd+0x4b0/0x4b0 [ 286.093313] ? lock_is_held_type+0x210/0x210 [ 286.097733] ? __alloc_fd+0x347/0x6e0 [ 286.101538] ? lock_downgrade+0x900/0x900 [ 286.105694] ? getname+0x19/0x20 [ 286.109078] ? kasan_check_read+0x11/0x20 [ 286.113232] ? do_raw_spin_unlock+0xa7/0x2f0 [ 286.117640] ? do_raw_spin_trylock+0x270/0x270 [ 286.122237] ? __check_object_size+0xb1/0x782 [ 286.126766] ? _raw_spin_unlock+0x2c/0x50 [ 286.130916] ? __alloc_fd+0x347/0x6e0 [ 286.134730] do_filp_open+0x255/0x380 [ 286.138529] ? may_open_dev+0x100/0x100 [ 286.142517] ? get_unused_fd_flags+0x122/0x1a0 [ 286.147102] ? __alloc_fd+0x6e0/0x6e0 [ 286.150914] do_sys_open+0x568/0x700 [ 286.154635] ? filp_open+0x80/0x80 [ 286.158189] ? trace_hardirqs_off_caller+0x300/0x300 [ 286.163292] ? do_sys_ftruncate+0x449/0x550 [ 286.167614] __x64_sys_open+0x7e/0xc0 [ 286.171430] do_syscall_64+0x1b9/0x820 [ 286.175319] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 286.180693] ? syscall_return_slowpath+0x5e0/0x5e0 [ 286.185623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.190481] ? trace_hardirqs_on_caller+0x310/0x310 [ 286.195503] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 286.200520] ? prepare_exit_to_usermode+0x291/0x3b0 [ 286.205541] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.210399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.215591] RIP: 0033:0x411171 [ 286.218786] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 286.237797] RSP: 002b:00007efcb5aeca80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 286.245513] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000411171 [ 286.252787] RDX: 00007efcb5aecafa RSI: 0000000000000002 RDI: 00007efcb5aecaf0 [ 286.260058] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 12:55:29 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='%xt-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 286.267332] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 286.274608] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:29 executing program 4 (fault-call:4 fault-nth:9): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 286.331519] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 286.348814] EXT4-fs (loop2): invalid inodes per group: 16384 [ 286.348814] [ 286.363001] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 286.363001] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 286.363001] [ 286.393822] EXT4-fs (sda1): re-mounted. Opts: noacl, 12:55:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x2000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000100)={0x1, 0x2, {0x1, 0x2, 0x10001, 0x0, 0xffffffffffffd5c7}}) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x10, 0x880) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xe803000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 286.455596] FAULT_INJECTION: forcing a failure. [ 286.455596] name failslab, interval 1, probability 0, space 0, times 0 [ 286.467930] CPU: 0 PID: 12108 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 286.476448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.485824] Call Trace: [ 286.488430] dump_stack+0x244/0x3ab [ 286.492072] ? dump_stack_print_info.cold.2+0x52/0x52 [ 286.497272] ? debug_smp_processor_id+0x1c/0x20 [ 286.501950] ? perf_trace_lock+0x14d/0x7a0 [ 286.506198] should_fail.cold.4+0xa/0x17 [ 286.510273] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.515378] ? pick_next_task_fair+0xa05/0x1b30 [ 286.520059] ? rcu_qs+0x23/0x110 [ 286.523441] ? rcu_note_context_switch+0x7d3/0x2150 [ 286.528468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.534298] ? check_preemption_disabled+0x48/0x200 [ 286.539321] ? debug_smp_processor_id+0x1c/0x20 [ 286.543997] ? perf_trace_lock+0x14d/0x7a0 [ 286.548238] ? __account_cfs_rq_runtime+0x790/0x790 [ 286.553263] ? lock_is_held_type+0x210/0x210 [ 286.557702] ? lock_is_held_type+0x210/0x210 [ 286.562118] ? fs_reclaim_acquire+0x20/0x20 [ 286.566448] ? lock_downgrade+0x900/0x900 [ 286.570610] ? perf_trace_sched_process_exec+0x860/0x860 [ 286.576066] ? enqueue_entity+0x34b/0x20d0 [ 286.580307] ? perf_trace_lock+0x14d/0x7a0 [ 286.584564] __should_failslab+0x124/0x180 [ 286.588808] should_failslab+0x9/0x14 [ 286.592615] kmem_cache_alloc+0x2be/0x730 [ 286.596782] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 286.601810] __kernfs_new_node+0x127/0x8d0 [ 286.606060] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 286.610822] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.616387] ? lock_is_held_type+0x210/0x210 [ 286.620804] ? debug_smp_processor_id+0x1c/0x20 [ 286.625485] ? perf_trace_lock+0x14d/0x7a0 [ 286.629723] ? __schedule+0x168b/0x21d0 [ 286.633709] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 286.639256] ? lock_is_held_type+0x210/0x210 [ 286.643677] ? __sched_text_start+0x8/0x8 [ 286.647848] ? enqueue_task_fair+0x24d/0xa50 [ 286.652265] ? lock_is_held_type+0x210/0x210 [ 286.656694] kernfs_new_node+0x95/0x120 [ 286.660698] kernfs_create_dir_ns+0x4d/0x160 [ 286.665119] internal_create_group+0x5fc/0xd80 [ 286.669717] ? remove_files.isra.1+0x190/0x190 [ 286.674299] ? up_write+0x7b/0x220 [ 286.677874] ? down_write_nested+0x130/0x130 [ 286.682293] ? down_read+0x120/0x120 [ 286.686023] sysfs_create_group+0x1f/0x30 [ 286.690192] lo_ioctl+0x1307/0x1d60 [ 286.693826] ? lo_rw_aio+0x1ef0/0x1ef0 [ 286.697725] blkdev_ioctl+0x9ac/0x2010 [ 286.701623] ? blkpg_ioctl+0xc10/0xc10 [ 286.705525] ? lock_downgrade+0x900/0x900 [ 286.709703] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 286.714656] ? save_stack+0x43/0xd0 [ 286.718292] ? __kasan_slab_free+0x102/0x150 [ 286.722719] ? __fget+0x4d1/0x740 [ 286.726181] ? ksys_dup3+0x680/0x680 [ 286.729909] block_ioctl+0xee/0x130 [ 286.733542] ? blkdev_fallocate+0x400/0x400 [ 286.737868] do_vfs_ioctl+0x1de/0x1720 [ 286.741762] ? trace_hardirqs_on+0xbd/0x310 [ 286.746095] ? ioctl_preallocate+0x300/0x300 [ 286.750510] ? __fget_light+0x2e9/0x430 [ 286.754485] ? fget_raw+0x20/0x20 [ 286.757942] ? putname+0xf2/0x130 [ 286.761403] ? kmem_cache_free+0x21a/0x290 [ 286.765644] ? putname+0xf7/0x130 [ 286.769120] ? do_sys_open+0x3ac/0x700 [ 286.773016] ? security_file_ioctl+0x94/0xc0 [ 286.777453] ksys_ioctl+0xa9/0xd0 [ 286.780923] __x64_sys_ioctl+0x73/0xb0 [ 286.784816] do_syscall_64+0x1b9/0x820 [ 286.788708] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 286.794091] ? syscall_return_slowpath+0x5e0/0x5e0 [ 286.799041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.803896] ? trace_hardirqs_on_caller+0x310/0x310 [ 286.808926] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 286.813957] ? prepare_exit_to_usermode+0x291/0x3b0 [ 286.818993] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.823845] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.829046] RIP: 0033:0x457387 [ 286.832243] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 12:55:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 286.851151] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 286.858889] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000457387 [ 286.866164] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 286.873433] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 286.880717] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 286.887990] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 [ 286.905516] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 286.905516] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 286.905516] [ 286.928430] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:30 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="ad78742d00", &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xf5f8030000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 286.967413] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:30 executing program 4 (fault-call:4 fault-nth:10): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:30 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x3ed) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2020}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0xbc, r3, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x24, 0x30}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x4}]}, 0xbc}, 0x1, 0x0, 0x0, 0x48810}, 0x810) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 287.037516] EXT4-fs (loop2): invalid inodes per group: 16384 [ 287.037516] [ 287.093018] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 287.093018] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 287.093018] [ 287.118897] EXT4-fs (sda1): re-mounted. Opts: noacl, [ 287.140630] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 287.159382] EXT4-fs (loop2): invalid inodes per group: 16384 [ 287.159382] 12:55:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x1000000) 12:55:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x200000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:30 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x210580, 0x0) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000100)) flistxattr(r0, &(0x7f0000000200)=""/225, 0xe1) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) write$binfmt_misc(r0, &(0x7f0000000300)={'syz1', "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"}, 0x1004) 12:55:30 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='\nxt-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 287.271425] FAULT_INJECTION: forcing a failure. [ 287.271425] name failslab, interval 1, probability 0, space 0, times 0 [ 287.291364] CPU: 0 PID: 12159 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 287.299891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.309253] Call Trace: [ 287.311856] dump_stack+0x244/0x3ab [ 287.315501] ? dump_stack_print_info.cold.2+0x52/0x52 [ 287.320720] should_fail.cold.4+0xa/0x17 [ 287.324796] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.329918] ? __enqueue_entity+0x10d/0x1f0 [ 287.334252] ? enqueue_entity+0x34b/0x20d0 [ 287.338493] ? put_prev_task_fair+0x80/0x80 [ 287.342817] ? __account_cfs_rq_runtime+0x790/0x790 [ 287.342834] ? rcu_softirq_qs+0x20/0x20 [ 287.342850] ? update_curr+0x200/0xbd0 [ 287.342870] ? fs_reclaim_acquire+0x20/0x20 [ 287.360050] ? lock_downgrade+0x900/0x900 [ 287.364214] ? perf_trace_sched_process_exec+0x860/0x860 [ 287.369675] ? enqueue_entity+0x34b/0x20d0 [ 287.373928] __should_failslab+0x124/0x180 [ 287.378166] should_failslab+0x9/0x14 [ 287.381972] kmem_cache_alloc+0x2be/0x730 [ 287.386128] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 287.391157] __kernfs_new_node+0x127/0x8d0 [ 287.395400] ? __this_cpu_preempt_check+0x1c/0x1f [ 287.400252] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 287.405497] ? trace_hardirqs_off+0xb8/0x310 [ 287.409914] ? task_fork_fair+0x6d0/0x6d0 [ 287.414064] ? try_to_wake_up+0x10a/0x12e0 [ 287.418308] ? lock_downgrade+0x900/0x900 [ 287.422461] ? check_preempt_curr+0x3a0/0x3a0 [ 287.426955] ? trace_hardirqs_on+0xbd/0x310 [ 287.431275] ? kasan_check_read+0x11/0x20 [ 287.435434] ? enqueue_task_fair+0x24d/0xa50 [ 287.439846] ? enqueue_entity+0x20d0/0x20d0 [ 287.444172] kernfs_new_node+0x95/0x120 [ 287.448156] kernfs_create_dir_ns+0x4d/0x160 [ 287.452576] internal_create_group+0x5fc/0xd80 [ 287.457172] ? remove_files.isra.1+0x190/0x190 [ 287.461753] ? up_write+0x7b/0x220 [ 287.465292] ? down_write_nested+0x130/0x130 [ 287.469712] ? down_read+0x120/0x120 [ 287.473441] sysfs_create_group+0x1f/0x30 [ 287.477591] lo_ioctl+0x1307/0x1d60 [ 287.481225] ? lo_rw_aio+0x1ef0/0x1ef0 [ 287.485110] blkdev_ioctl+0x9ac/0x2010 [ 287.489001] ? blkpg_ioctl+0xc10/0xc10 [ 287.492893] ? lock_downgrade+0x900/0x900 [ 287.497046] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 287.501983] ? save_stack+0x43/0xd0 [ 287.505613] ? __kasan_slab_free+0x102/0x150 [ 287.510025] ? __fget+0x4d1/0x740 [ 287.513480] ? ksys_dup3+0x680/0x680 [ 287.517203] block_ioctl+0xee/0x130 [ 287.520860] ? blkdev_fallocate+0x400/0x400 [ 287.525186] do_vfs_ioctl+0x1de/0x1720 [ 287.529083] ? trace_hardirqs_on+0xbd/0x310 [ 287.533415] ? ioctl_preallocate+0x300/0x300 [ 287.537830] ? __fget_light+0x2e9/0x430 [ 287.541807] ? fget_raw+0x20/0x20 [ 287.545260] ? putname+0xf2/0x130 [ 287.548723] ? kmem_cache_free+0x21a/0x290 [ 287.552962] ? putname+0xf7/0x130 [ 287.556421] ? do_sys_open+0x3ac/0x700 [ 287.560312] ? security_file_ioctl+0x94/0xc0 [ 287.564728] ksys_ioctl+0xa9/0xd0 [ 287.568190] __x64_sys_ioctl+0x73/0xb0 [ 287.572084] do_syscall_64+0x1b9/0x820 [ 287.575975] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 287.581345] ? syscall_return_slowpath+0x5e0/0x5e0 [ 287.586280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.591129] ? trace_hardirqs_on_caller+0x310/0x310 [ 287.596149] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 287.601167] ? prepare_exit_to_usermode+0x291/0x3b0 [ 287.606194] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.611061] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 287.616262] RIP: 0033:0x457387 [ 287.619455] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 287.638358] RSP: 002b:00007efcb5acba88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 287.646076] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000457387 [ 287.653346] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 287.660612] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 287.667882] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 287.675150] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0xfffffffffffffdfb) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 287.730517] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x3e8}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 287.778854] EXT4-fs (loop2): invalid inodes per group: 16384 [ 287.778854] 12:55:30 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='e\nt-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:30 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) writev(r0, &(0x7f00000004c0)=[{&(0x7f0000000200)="db2f84c68f01f4c1ed8916d607dc0ef9c32286891a1a8523aff2211dc55cc3590f37bfa9231b96abad42b1a340fcdb32de2a88f026f30d3914eabec7fd6c5b8f149ad348c6192716b6bf0f59049b9a86674d038599cce2df297dd458d65be9fb989fccd62ee7e7aadbc466d34aeab15b43605bbbc6d5ca342ddf53f4abacf8a31410e205595e012f1482e908771fa089195e2b34493b58e2d453efd00e2cae6d8816c196b16bbd6080db9d1f86a1b075dd53a6c6d298d9920e94adee7a4b9b077b406d512c0a48ffec09691efdc0f4c6c7fd50e5ea7ca25103a727d03b0798f28396ac3a11f107719bef48b38027b4ec", 0xf0}, {&(0x7f0000000300)="f6e9a703e7f3cdae52e8d918c32b8132630aa57b3620088ea3aede06b590e4345dd711cfb26803f6e6789af86fb0971b2c3e3d7a4412f181fa1b51c6e97af56bfe7fe0cc5edddc3b48c7d52d978cfb3f1435fa0929e97f1c7c8b9433eca1be81e3f19cc6d960e557b2257b131a378616e1e22050a9336dd2db05ca7de08bb1c8c443ad89f8a2241f0e", 0x89}, {&(0x7f00000003c0)="9a0aa93de30c969ba6ca5812a44418f20cc32d85e12206f99bba5f5a35d00f3e16ee2bc5bef90c9e8ba2d7c2a195f9468d12f31f271f0f2b02ec047ad6346dc4139be01c643973e9bdc012a2b3a5c94ee53efeefb70675d2235d61879b3d318f3febb547aaeb272e7d68810b103c9e1687b6a411417306cd6aeaa9a47497543c965fa617", 0x84}, {&(0x7f0000000480)="cc033fef75745145b933c000d42015291f44ea9622abfecf05397c3af55a5c2e8f6ff6867c8fe36f5fa2", 0x2a}], 0x4) 12:55:31 executing program 4 (fault-call:4 fault-nth:11): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 287.862915] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 287.885717] EXT4-fs (loop2): invalid inodes per group: 16384 [ 287.885717] 12:55:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x8000a0ffffffff}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x500700) 12:55:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7f, 0x80800) ioctl$KVM_SMI(r1, 0xaeb7) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 288.025160] FAULT_INJECTION: forcing a failure. [ 288.025160] name failslab, interval 1, probability 0, space 0, times 0 [ 288.059664] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xe00000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 288.079209] CPU: 0 PID: 12216 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 288.087769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.097132] Call Trace: [ 288.099741] dump_stack+0x244/0x3ab [ 288.103398] ? dump_stack_print_info.cold.2+0x52/0x52 [ 288.108605] ? radix_tree_tag_set+0x3d0/0x3d0 [ 288.108632] should_fail.cold.4+0xa/0x17 [ 288.108666] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.117214] ? __save_stack_trace+0x8d/0xf0 [ 288.117234] ? lock_acquire+0x1ed/0x520 [ 288.117254] ? kernfs_activate+0x8e/0x2c0 [ 288.134806] ? lock_release+0xa10/0xa10 [ 288.138789] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.144263] ? fs_reclaim_acquire+0x20/0x20 [ 288.148597] ? lock_downgrade+0x900/0x900 [ 288.152776] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.158237] __should_failslab+0x124/0x180 [ 288.162476] should_failslab+0x9/0x14 [ 288.166286] kmem_cache_alloc+0x2be/0x730 [ 288.170442] ? kasan_check_read+0x11/0x20 [ 288.174595] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 288.179627] __kernfs_new_node+0x127/0x8d0 [ 288.183877] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 288.188642] ? kasan_check_write+0x14/0x20 [ 288.192897] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 288.197832] ? __kernfs_new_node+0x697/0x8d0 [ 288.202245] ? wait_for_completion+0x8a0/0x8a0 [ 288.206835] ? kasan_check_write+0x14/0x20 [ 288.211083] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 288.216036] ? _raw_spin_unlock_irq+0x60/0x80 [ 288.220535] ? __schedule+0x168b/0x21d0 [ 288.224514] ? wait_for_completion+0x8a0/0x8a0 [ 288.229110] ? mutex_unlock+0xd/0x10 [ 288.232833] ? kernfs_activate+0x21a/0x2c0 [ 288.237073] kernfs_new_node+0x95/0x120 [ 288.241057] __kernfs_create_file+0x5a/0x340 [ 288.245492] sysfs_add_file_mode_ns+0x222/0x530 [ 288.250172] internal_create_group+0x3df/0xd80 [ 288.254771] ? remove_files.isra.1+0x190/0x190 [ 288.259362] ? up_write+0x7b/0x220 [ 288.262911] ? down_write_nested+0x130/0x130 [ 288.267331] ? down_read+0x120/0x120 [ 288.271057] sysfs_create_group+0x1f/0x30 [ 288.275219] lo_ioctl+0x1307/0x1d60 [ 288.278856] ? lo_rw_aio+0x1ef0/0x1ef0 [ 288.282760] blkdev_ioctl+0x9ac/0x2010 [ 288.286669] ? blkpg_ioctl+0xc10/0xc10 [ 288.290567] ? lock_downgrade+0x900/0x900 [ 288.294732] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 288.299685] ? save_stack+0x43/0xd0 [ 288.303317] ? __kasan_slab_free+0x102/0x150 [ 288.307735] ? __fget+0x4d1/0x740 [ 288.311207] ? ksys_dup3+0x680/0x680 [ 288.314944] block_ioctl+0xee/0x130 [ 288.318607] ? blkdev_fallocate+0x400/0x400 [ 288.323033] do_vfs_ioctl+0x1de/0x1720 [ 288.326933] ? trace_hardirqs_on+0xbd/0x310 [ 288.331272] ? ioctl_preallocate+0x300/0x300 [ 288.335709] ? __fget_light+0x2e9/0x430 [ 288.339716] ? fget_raw+0x20/0x20 [ 288.343188] ? putname+0xf2/0x130 [ 288.346671] ? kmem_cache_free+0x21a/0x290 [ 288.350931] ? putname+0xf7/0x130 [ 288.354398] ? do_sys_open+0x3ac/0x700 [ 288.358301] ? security_file_ioctl+0x94/0xc0 [ 288.362732] ksys_ioctl+0xa9/0xd0 [ 288.366202] __x64_sys_ioctl+0x73/0xb0 [ 288.370104] do_syscall_64+0x1b9/0x820 [ 288.373992] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 288.379369] ? syscall_return_slowpath+0x5e0/0x5e0 [ 288.384306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.389165] ? trace_hardirqs_on_caller+0x310/0x310 [ 288.394207] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 288.399266] ? prepare_exit_to_usermode+0x291/0x3b0 [ 288.404401] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.409270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 288.414471] RIP: 0033:0x457387 [ 288.417690] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.436598] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 288.444317] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000457387 [ 288.451593] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 288.458875] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 288.466156] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 288.473432] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:31 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='e%t-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 288.484879] EXT4-fs (loop2): invalid inodes per group: 16384 [ 288.484879] 12:55:31 executing program 4 (fault-call:4 fault-nth:12): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 288.554941] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 288.573235] EXT4-fs (loop2): invalid inodes per group: 16384 [ 288.573235] 12:55:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000100)=0x30) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x3f000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="6578743210", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x80000000000000) 12:55:31 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="65ad742d00", &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:31 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x4400, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000240)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000040)='\x00'}, 0x30) sched_getattr(r3, &(0x7f0000000140), 0x30, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 288.775084] FAULT_INJECTION: forcing a failure. [ 288.775084] name failslab, interval 1, probability 0, space 0, times 0 12:55:31 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x40020000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 288.833438] CPU: 0 PID: 12254 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 288.841993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.851357] Call Trace: [ 288.853968] dump_stack+0x244/0x3ab [ 288.857620] ? dump_stack_print_info.cold.2+0x52/0x52 [ 288.862846] ? debug_smp_processor_id+0x1c/0x20 [ 288.867533] ? rcu_preempt_need_deferred_qs+0x74/0x1f0 [ 288.872826] should_fail.cold.4+0xa/0x17 [ 288.876907] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.882025] ? pick_next_task_fair+0xa05/0x1b30 [ 288.886715] ? rcu_qs+0x23/0x110 [ 288.890107] ? rcu_note_context_switch+0x7d3/0x2150 [ 288.895132] ? enqueue_entity+0x34b/0x20d0 [ 288.899386] ? run_rebalance_domains+0x500/0x500 [ 288.904151] ? __account_cfs_rq_runtime+0x790/0x790 [ 288.909200] ? rcu_softirq_qs+0x20/0x20 [ 288.913189] ? update_curr+0x200/0xbd0 [ 288.917091] ? fs_reclaim_acquire+0x20/0x20 [ 288.921430] ? lock_downgrade+0x900/0x900 [ 288.925595] ? perf_trace_sched_process_exec+0x860/0x860 [ 288.931054] ? enqueue_entity+0x34b/0x20d0 [ 288.935309] __should_failslab+0x124/0x180 [ 288.939556] should_failslab+0x9/0x14 [ 288.943377] kmem_cache_alloc+0x2be/0x730 [ 288.947547] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 288.952576] __kernfs_new_node+0x127/0x8d0 [ 288.956826] ? trace_hardirqs_off_caller+0x300/0x300 [ 288.961941] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 288.966746] ? _raw_spin_unlock_irq+0x60/0x80 [ 288.971250] ? __schedule+0x168b/0x21d0 [ 288.975241] ? __sched_text_start+0x8/0x8 [ 288.979394] ? check_preempt_curr+0x3a0/0x3a0 [ 288.983904] ? trace_hardirqs_on+0xbd/0x310 [ 288.988239] ? kasan_check_read+0x11/0x20 [ 288.992402] ? enqueue_task_fair+0x24d/0xa50 [ 288.996819] ? enqueue_entity+0x20d0/0x20d0 [ 289.001163] kernfs_new_node+0x95/0x120 [ 289.005157] kernfs_create_dir_ns+0x4d/0x160 [ 289.009594] internal_create_group+0x5fc/0xd80 [ 289.014199] ? remove_files.isra.1+0x190/0x190 [ 289.018786] ? up_write+0x7b/0x220 [ 289.022332] ? down_write_nested+0x130/0x130 [ 289.026750] ? down_read+0x120/0x120 [ 289.030493] sysfs_create_group+0x1f/0x30 [ 289.034663] lo_ioctl+0x1307/0x1d60 [ 289.038315] ? lo_rw_aio+0x1ef0/0x1ef0 [ 289.042211] blkdev_ioctl+0x9ac/0x2010 [ 289.046112] ? blkpg_ioctl+0xc10/0xc10 [ 289.050009] ? lock_downgrade+0x900/0x900 [ 289.054179] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 289.059124] ? rcu_is_watching+0x30/0x30 [ 289.063190] ? __kasan_slab_free+0x119/0x150 [ 289.067611] ? kzfree+0x28/0x30 [ 289.070904] ? blkcg_maybe_throttle_current+0x5ae/0x1450 [ 289.076375] ? __fget+0x4d1/0x740 [ 289.079840] ? ksys_dup3+0x680/0x680 [ 289.083574] block_ioctl+0xee/0x130 [ 289.087213] ? blkdev_fallocate+0x400/0x400 [ 289.091545] do_vfs_ioctl+0x1de/0x1720 [ 289.095446] ? task_work_run+0x1af/0x2a0 [ 289.099513] ? trace_hardirqs_off_caller+0x300/0x300 [ 289.104630] ? ioctl_preallocate+0x300/0x300 [ 289.109055] ? __fget_light+0x2e9/0x430 [ 289.113039] ? fget_raw+0x20/0x20 [ 289.116514] ? trace_hardirqs_off+0xb8/0x310 [ 289.120930] ? do_syscall_64+0x6be/0x820 [ 289.125000] ? trace_hardirqs_on+0x310/0x310 [ 289.129424] ? do_sys_open+0x3ac/0x700 [ 289.133326] ? security_file_ioctl+0x94/0xc0 [ 289.137755] ksys_ioctl+0xa9/0xd0 [ 289.141228] __x64_sys_ioctl+0x73/0xb0 [ 289.145127] do_syscall_64+0x1b9/0x820 [ 289.149025] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.154401] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.159350] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.164212] ? trace_hardirqs_on_caller+0x310/0x310 [ 289.169249] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 289.174288] ? prepare_exit_to_usermode+0x291/0x3b0 [ 289.179333] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.184203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 289.189423] RIP: 0033:0x457387 [ 289.192631] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.211569] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 289.219300] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000457387 [ 289.226585] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 289.233864] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 289.241137] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 289.248421] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xa}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:32 executing program 4 (fault-call:4 fault-nth:13): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 289.439796] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x1100000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:32 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="6578a02d00", &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 289.521347] EXT4-fs (loop2): invalid inodes per group: 16384 [ 289.521347] [ 289.604408] FAULT_INJECTION: forcing a failure. [ 289.604408] name failslab, interval 1, probability 0, space 0, times 0 [ 289.627284] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:32 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0x15, &(0x7f0000000100)='drbg_nopr_ctr_aes256\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)=r3, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000200)={0x3, 0x8, 0x20000000000000, 'queue1\x00', 0xfffffffffffffff7}) [ 289.647905] CPU: 0 PID: 12311 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 289.656452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.665810] Call Trace: [ 289.668501] dump_stack+0x244/0x3ab [ 289.672149] ? dump_stack_print_info.cold.2+0x52/0x52 [ 289.677363] ? debug_smp_processor_id+0x1c/0x20 [ 289.682036] ? perf_trace_lock+0x14d/0x7a0 [ 289.686281] should_fail.cold.4+0xa/0x17 [ 289.690354] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.695480] ? perf_trace_lock+0x14d/0x7a0 [ 289.695495] ? lock_release+0xa10/0xa10 [ 289.695508] ? perf_trace_sched_process_exec+0x860/0x860 [ 289.695521] ? lock_is_held_type+0x210/0x210 [ 289.695536] ? check_preemption_disabled+0x48/0x200 [ 289.695557] ? __mutex_lock+0x85e/0x16f0 [ 289.722646] ? kernfs_activate+0x8e/0x2c0 [ 289.726826] ? lock_is_held_type+0x210/0x210 [ 289.731250] ? fs_reclaim_acquire+0x20/0x20 [ 289.735592] ? lock_downgrade+0x900/0x900 [ 289.739748] ? __mutex_lock+0x85e/0x16f0 [ 289.743826] ? perf_trace_sched_process_exec+0x860/0x860 [ 289.749280] ? kernfs_activate+0x21a/0x2c0 [ 289.753538] __should_failslab+0x124/0x180 [ 289.757781] should_failslab+0x9/0x14 [ 289.761591] kmem_cache_alloc+0x2be/0x730 [ 289.765744] ? lock_downgrade+0x900/0x900 [ 289.769903] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 289.774930] __kernfs_new_node+0x127/0x8d0 [ 289.779174] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 289.783936] ? kasan_check_write+0x14/0x20 [ 289.788184] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 289.793119] ? wait_for_completion+0x8a0/0x8a0 [ 289.797712] ? wait_for_completion+0x8a0/0x8a0 [ 289.802302] ? kasan_check_write+0x14/0x20 [ 289.806543] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 289.811487] ? mutex_unlock+0xd/0x10 [ 289.815207] ? kernfs_activate+0x21a/0x2c0 [ 289.819455] ? kernfs_walk_and_get_ns+0x340/0x340 [ 289.824307] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 289.829858] ? kernfs_link_sibling+0x1d2/0x3b0 [ 289.834456] kernfs_new_node+0x95/0x120 [ 289.838441] __kernfs_create_file+0x5a/0x340 [ 289.842868] sysfs_add_file_mode_ns+0x222/0x530 [ 289.847553] internal_create_group+0x3df/0xd80 [ 289.852155] ? remove_files.isra.1+0x190/0x190 [ 289.856745] ? up_write+0x7b/0x220 [ 289.860292] ? down_write_nested+0x130/0x130 [ 289.864712] ? down_read+0x120/0x120 [ 289.868443] sysfs_create_group+0x1f/0x30 [ 289.872596] lo_ioctl+0x1307/0x1d60 [ 289.876235] ? lo_rw_aio+0x1ef0/0x1ef0 [ 289.880128] blkdev_ioctl+0x9ac/0x2010 [ 289.884018] ? blkpg_ioctl+0xc10/0xc10 [ 289.887914] ? lock_downgrade+0x900/0x900 [ 289.892072] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 289.897018] ? save_stack+0x43/0xd0 [ 289.900660] ? __kasan_slab_free+0x102/0x150 [ 289.905082] ? __fget+0x4d1/0x740 [ 289.908550] ? ksys_dup3+0x680/0x680 [ 289.912286] block_ioctl+0xee/0x130 [ 289.915922] ? blkdev_fallocate+0x400/0x400 [ 289.920254] do_vfs_ioctl+0x1de/0x1720 [ 289.924147] ? trace_hardirqs_on+0xbd/0x310 [ 289.928478] ? ioctl_preallocate+0x300/0x300 [ 289.932898] ? __fget_light+0x2e9/0x430 [ 289.936886] ? fget_raw+0x20/0x20 [ 289.940342] ? putname+0xf2/0x130 [ 289.943807] ? kmem_cache_free+0x21a/0x290 [ 289.948057] ? putname+0xf7/0x130 [ 289.951524] ? do_sys_open+0x3ac/0x700 [ 289.955422] ? security_file_ioctl+0x94/0xc0 [ 289.959843] ksys_ioctl+0xa9/0xd0 [ 289.963312] __x64_sys_ioctl+0x73/0xb0 [ 289.967207] do_syscall_64+0x1b9/0x820 [ 289.971109] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 289.976492] ? syscall_return_slowpath+0x5e0/0x5e0 [ 289.981424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.986274] ? trace_hardirqs_on_caller+0x310/0x310 [ 289.991305] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 289.996335] ? prepare_exit_to_usermode+0x291/0x3b0 [ 290.001367] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.006224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.011421] RIP: 0033:0x457387 [ 290.014621] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.033539] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 290.041256] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000457387 [ 290.048527] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 290.055810] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 290.063104] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 290.070379] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 [ 290.082319] EXT4-fs (loop2): invalid inodes per group: 16384 [ 290.082319] 12:55:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x4000000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 290.130608] EXT4-fs: 26 callbacks suppressed [ 290.130626] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 290.130626] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 290.130626] 12:55:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 290.221450] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 290.256842] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 290.277027] EXT4-fs (loop2): invalid inodes per group: 16384 [ 290.277027] 12:55:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x3f00000000000000) 12:55:33 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ex\n-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x700000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:33 executing program 4 (fault-call:4 fault-nth:14): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 290.358010] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 290.372116] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 290.372116] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 290.372116] 12:55:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80000, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000100)=0x80, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) connect$rds(r1, &(0x7f0000000240)={0x2, 0x2000004e21}, 0x9) 12:55:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x7000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 290.412420] EXT4-fs (loop2): invalid inodes per group: 16384 [ 290.412420] [ 290.434802] EXT4-fs (sda1): re-mounted. Opts: noacl, 12:55:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 290.542576] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 290.542576] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 290.542576] [ 290.558843] FAULT_INJECTION: forcing a failure. [ 290.558843] name failslab, interval 1, probability 0, space 0, times 0 [ 290.584398] CPU: 1 PID: 12368 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 290.592967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.602336] Call Trace: [ 290.604940] dump_stack+0x244/0x3ab [ 290.608599] ? dump_stack_print_info.cold.2+0x52/0x52 [ 290.613818] should_fail.cold.4+0xa/0x17 [ 290.617905] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 290.623030] ? lock_release+0xa10/0xa10 [ 290.627023] ? perf_trace_sched_process_exec+0x860/0x860 [ 290.632593] ? __mutex_lock+0x85e/0x16f0 [ 290.636680] ? node_tag_clear+0xc2/0x1c0 [ 290.640765] ? kernfs_activate+0x8e/0x2c0 [ 290.644940] ? fs_reclaim_acquire+0x20/0x20 [ 290.649282] ? lock_downgrade+0x900/0x900 [ 290.653474] ? __mutex_lock+0x85e/0x16f0 [ 290.657677] ? perf_trace_sched_process_exec+0x860/0x860 [ 290.663149] ? kernfs_activate+0x21a/0x2c0 [ 290.667409] __should_failslab+0x124/0x180 [ 290.671662] should_failslab+0x9/0x14 [ 290.675475] kmem_cache_alloc+0x2be/0x730 [ 290.679632] ? lock_downgrade+0x900/0x900 [ 290.683796] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 290.688814] __kernfs_new_node+0x127/0x8d0 [ 290.693054] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 290.697828] ? kasan_check_write+0x14/0x20 [ 290.702079] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 290.707012] ? wait_for_completion+0x8a0/0x8a0 [ 290.711598] ? wait_for_completion+0x8a0/0x8a0 [ 290.716191] ? kasan_check_write+0x14/0x20 [ 290.720432] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 290.725371] ? mutex_unlock+0xd/0x10 [ 290.729091] ? kernfs_activate+0x21a/0x2c0 [ 290.733340] ? kernfs_walk_and_get_ns+0x340/0x340 [ 290.738201] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 290.743744] ? kernfs_link_sibling+0x1d2/0x3b0 [ 290.748339] kernfs_new_node+0x95/0x120 [ 290.752326] __kernfs_create_file+0x5a/0x340 [ 290.756747] sysfs_add_file_mode_ns+0x222/0x530 [ 290.761431] internal_create_group+0x3df/0xd80 [ 290.766033] ? remove_files.isra.1+0x190/0x190 [ 290.770617] ? up_write+0x7b/0x220 [ 290.774164] ? down_write_nested+0x130/0x130 [ 290.778581] ? down_read+0x120/0x120 [ 290.782307] sysfs_create_group+0x1f/0x30 [ 290.786458] lo_ioctl+0x1307/0x1d60 [ 290.790091] ? lo_rw_aio+0x1ef0/0x1ef0 [ 290.793982] blkdev_ioctl+0x9ac/0x2010 [ 290.797875] ? blkpg_ioctl+0xc10/0xc10 [ 290.801773] ? lock_downgrade+0x900/0x900 [ 290.805936] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 290.810878] ? save_stack+0x43/0xd0 [ 290.814507] ? __kasan_slab_free+0x102/0x150 [ 290.818948] ? __fget+0x4d1/0x740 [ 290.822419] ? ksys_dup3+0x680/0x680 [ 290.826155] block_ioctl+0xee/0x130 [ 290.829794] ? blkdev_fallocate+0x400/0x400 [ 290.834126] do_vfs_ioctl+0x1de/0x1720 [ 290.838020] ? trace_hardirqs_on+0xbd/0x310 [ 290.842353] ? ioctl_preallocate+0x300/0x300 [ 290.846775] ? __fget_light+0x2e9/0x430 [ 290.850757] ? fget_raw+0x20/0x20 [ 290.854219] ? putname+0xf2/0x130 [ 290.857684] ? kmem_cache_free+0x21a/0x290 [ 290.861928] ? putname+0xf7/0x130 [ 290.865390] ? do_sys_open+0x3ac/0x700 [ 290.869286] ? security_file_ioctl+0x94/0xc0 [ 290.873704] ksys_ioctl+0xa9/0xd0 [ 290.877168] __x64_sys_ioctl+0x73/0xb0 [ 290.881068] do_syscall_64+0x1b9/0x820 [ 290.884961] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 290.890334] ? syscall_return_slowpath+0x5e0/0x5e0 [ 290.895268] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.900119] ? trace_hardirqs_on_caller+0x310/0x310 [ 290.905143] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 290.910173] ? prepare_exit_to_usermode+0x291/0x3b0 [ 290.915214] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.920067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.925261] RIP: 0033:0x457387 12:55:33 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 290.928461] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.947365] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 290.955084] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000457387 [ 290.962359] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 290.969634] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 290.976918] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 290.984194] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 [ 290.993385] EXT4-fs (sda1): re-mounted. Opts: noacl, 12:55:34 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ex%-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xa000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 291.034628] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 291.034628] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 291.034628] [ 291.052497] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:34 executing program 4 (fault-call:4 fault-nth:15): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:34 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1f, 0xc, &(0x7f0000000100)=@raw=[@alu={0x7, 0xaaf, 0xc, 0xf, 0x0, 0x8, 0xffffffffffffffff}, @alu={0x7, 0x8d, 0xf, 0x9, 0x7, 0xffffffffffffffe8, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x4a}, @jmp={0x5, 0x1, 0x0, 0xc, 0x5, 0x0, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffff80000001}, @jmp={0x5, 0x9, 0xf, 0x0, 0x0, 0xfffffffffffffffe, 0xc}], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x41000, 0x1, [], 0x0, 0x60bdb50c03ee4559}, 0x48) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) syz_open_dev$sndpcmp(&(0x7f0000001380)='/dev/snd/pcmC#D#p\x00', 0x2, 0x10000) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000002a00), &(0x7f0000002a40)=0x4) recvfrom(0xffffffffffffffff, &(0x7f0000001280)=""/196, 0xc4, 0x40000040, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000013c0)={'veth0_to_bridge\x00', {0x2, 0x4e22, @broadcast}}) r2 = socket$alg(0x26, 0x5, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x400000000020412, r2, 0x0) [ 291.107891] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 291.138646] EXT4-fs (loop2): invalid inodes per group: 16384 [ 291.138646] [ 291.201682] FAULT_INJECTION: forcing a failure. [ 291.201682] name failslab, interval 1, probability 0, space 0, times 0 [ 291.231570] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 291.239676] EXT4-fs (loop2): invalid inodes per group: 16384 [ 291.239676] [ 291.251425] CPU: 0 PID: 12401 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 291.259972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.269344] Call Trace: [ 291.271962] dump_stack+0x244/0x3ab [ 291.275610] ? dump_stack_print_info.cold.2+0x52/0x52 [ 291.280822] should_fail.cold.4+0xa/0x17 [ 291.284896] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 291.290017] ? lock_release+0xa10/0xa10 [ 291.294027] ? perf_trace_sched_process_exec+0x860/0x860 [ 291.299500] ? __mutex_lock+0x85e/0x16f0 [ 291.303566] ? node_tag_clear+0xc2/0x1c0 [ 291.307632] ? kernfs_activate+0x8e/0x2c0 [ 291.311802] ? fs_reclaim_acquire+0x20/0x20 [ 291.316138] ? lock_downgrade+0x900/0x900 [ 291.320297] ? __mutex_lock+0x85e/0x16f0 [ 291.324368] ? perf_trace_sched_process_exec+0x860/0x860 [ 291.329826] ? kernfs_activate+0x21a/0x2c0 [ 291.334077] __should_failslab+0x124/0x180 [ 291.338322] should_failslab+0x9/0x14 [ 291.342130] kmem_cache_alloc+0x2be/0x730 [ 291.346283] ? lock_downgrade+0x900/0x900 [ 291.350433] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 291.355460] __kernfs_new_node+0x127/0x8d0 [ 291.359715] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 291.364480] ? kasan_check_write+0x14/0x20 [ 291.368759] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 291.373701] ? wait_for_completion+0x8a0/0x8a0 [ 291.378319] ? wait_for_completion+0x8a0/0x8a0 [ 291.382913] ? kasan_check_write+0x14/0x20 [ 291.387156] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 291.392100] ? mutex_unlock+0xd/0x10 [ 291.395823] ? kernfs_activate+0x21a/0x2c0 [ 291.400076] ? kernfs_walk_and_get_ns+0x340/0x340 [ 291.405431] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 291.410980] ? kernfs_link_sibling+0x1d2/0x3b0 [ 291.415578] kernfs_new_node+0x95/0x120 [ 291.419574] __kernfs_create_file+0x5a/0x340 [ 291.424012] sysfs_add_file_mode_ns+0x222/0x530 [ 291.428715] internal_create_group+0x3df/0xd80 [ 291.433320] ? remove_files.isra.1+0x190/0x190 [ 291.437909] ? up_write+0x7b/0x220 [ 291.441460] ? down_write_nested+0x130/0x130 [ 291.445885] ? down_read+0x120/0x120 [ 291.449623] sysfs_create_group+0x1f/0x30 [ 291.453792] lo_ioctl+0x1307/0x1d60 [ 291.457433] ? lo_rw_aio+0x1ef0/0x1ef0 [ 291.461328] blkdev_ioctl+0x9ac/0x2010 [ 291.465234] ? blkpg_ioctl+0xc10/0xc10 [ 291.469137] ? lock_downgrade+0x900/0x900 [ 291.473309] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 291.478289] ? save_stack+0x43/0xd0 [ 291.481925] ? __kasan_slab_free+0x102/0x150 [ 291.486355] ? __fget+0x4d1/0x740 [ 291.489833] ? ksys_dup3+0x680/0x680 [ 291.493566] block_ioctl+0xee/0x130 [ 291.497205] ? blkdev_fallocate+0x400/0x400 [ 291.501536] do_vfs_ioctl+0x1de/0x1720 [ 291.505438] ? trace_hardirqs_on+0xbd/0x310 [ 291.509789] ? ioctl_preallocate+0x300/0x300 [ 291.514231] ? __fget_light+0x2e9/0x430 [ 291.518216] ? fget_raw+0x20/0x20 [ 291.521682] ? putname+0xf2/0x130 [ 291.525153] ? kmem_cache_free+0x21a/0x290 [ 291.529395] ? putname+0xf7/0x130 [ 291.532879] ? do_sys_open+0x3ac/0x700 [ 291.536803] ? security_file_ioctl+0x94/0xc0 [ 291.541228] ksys_ioctl+0xa9/0xd0 [ 291.544710] __x64_sys_ioctl+0x73/0xb0 [ 291.548614] do_syscall_64+0x1b9/0x820 [ 291.552514] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 291.557899] ? syscall_return_slowpath+0x5e0/0x5e0 [ 291.562835] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.567704] ? trace_hardirqs_on_caller+0x310/0x310 [ 291.572750] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 291.577787] ? prepare_exit_to_usermode+0x291/0x3b0 [ 291.582818] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.587681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.592901] RIP: 0033:0x457387 [ 291.596102] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.615009] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.622747] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000457387 [ 291.630037] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 291.637330] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 291.644606] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 291.651881] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 [ 291.671875] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 291.671875] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 291.671875] [ 291.695364] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:34 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x280700) 12:55:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x8000a0}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) memfd_create(&(0x7f0000000040)='eth1:%\x00', 0x2) socket(0x1b, 0x0, 0x2) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:34 executing program 4 (fault-call:4 fault-nth:16): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:34 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="6578ad2d00", &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 291.877610] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 291.908427] FAULT_INJECTION: forcing a failure. [ 291.908427] name failslab, interval 1, probability 0, space 0, times 0 12:55:35 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000100)=0xc) r3 = getegid() ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) fchown(r1, r2, r3) r4 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x10240000000000, 0x8000) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000200), &(0x7f0000000240)=0x4) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 291.936927] EXT4-fs (loop2): invalid inodes per group: 16384 [ 291.936927] [ 291.958052] CPU: 1 PID: 12435 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 291.966601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.975964] Call Trace: [ 291.978581] dump_stack+0x244/0x3ab [ 291.982241] ? dump_stack_print_info.cold.2+0x52/0x52 [ 291.987454] ? debug_smp_processor_id+0x1c/0x20 [ 291.987469] ? perf_trace_lock+0x14d/0x7a0 [ 291.987490] should_fail.cold.4+0xa/0x17 [ 292.000443] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.000460] ? perf_trace_lock+0x14d/0x7a0 [ 292.000479] ? lock_release+0xa10/0xa10 [ 292.013785] ? perf_trace_sched_process_exec+0x860/0x860 [ 292.019256] ? lock_is_held_type+0x210/0x210 [ 292.023694] ? check_preemption_disabled+0x48/0x200 [ 292.028734] ? __mutex_lock+0x85e/0x16f0 [ 292.032806] ? kernfs_activate+0x8e/0x2c0 12:55:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xa00}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 292.036962] ? lock_is_held_type+0x210/0x210 [ 292.041385] ? fs_reclaim_acquire+0x20/0x20 [ 292.045716] ? lock_downgrade+0x900/0x900 [ 292.049873] ? __mutex_lock+0x85e/0x16f0 [ 292.049895] ? perf_trace_sched_process_exec+0x860/0x860 [ 292.049916] ? kernfs_activate+0x21a/0x2c0 [ 292.059480] __should_failslab+0x124/0x180 [ 292.059502] should_failslab+0x9/0x14 [ 292.071766] kmem_cache_alloc+0x2be/0x730 [ 292.075938] ? lock_downgrade+0x900/0x900 [ 292.080109] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 292.085152] __kernfs_new_node+0x127/0x8d0 [ 292.089403] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 292.094170] ? kasan_check_write+0x14/0x20 [ 292.098422] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 292.103357] ? wait_for_completion+0x8a0/0x8a0 [ 292.107947] ? wait_for_completion+0x8a0/0x8a0 [ 292.112535] ? kasan_check_write+0x14/0x20 [ 292.116778] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 292.121722] ? mutex_unlock+0xd/0x10 [ 292.125443] ? kernfs_activate+0x21a/0x2c0 [ 292.129689] ? kernfs_walk_and_get_ns+0x340/0x340 [ 292.134538] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 292.140085] ? kernfs_link_sibling+0x1d2/0x3b0 [ 292.144689] kernfs_new_node+0x95/0x120 [ 292.148684] __kernfs_create_file+0x5a/0x340 [ 292.153101] sysfs_add_file_mode_ns+0x222/0x530 [ 292.157787] internal_create_group+0x3df/0xd80 [ 292.162388] ? remove_files.isra.1+0x190/0x190 [ 292.166977] ? up_write+0x7b/0x220 [ 292.170524] ? down_write_nested+0x130/0x130 [ 292.174940] ? down_read+0x120/0x120 [ 292.178684] sysfs_create_group+0x1f/0x30 [ 292.182861] lo_ioctl+0x1307/0x1d60 [ 292.186509] ? lo_rw_aio+0x1ef0/0x1ef0 [ 292.190406] blkdev_ioctl+0x9ac/0x2010 [ 292.194304] ? blkpg_ioctl+0xc10/0xc10 [ 292.198202] ? lock_downgrade+0x900/0x900 [ 292.202392] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 292.207350] ? save_stack+0x43/0xd0 [ 292.210985] ? __kasan_slab_free+0x102/0x150 [ 292.215401] ? __fget+0x4d1/0x740 [ 292.218866] ? ksys_dup3+0x680/0x680 [ 292.222596] block_ioctl+0xee/0x130 [ 292.226238] ? blkdev_fallocate+0x400/0x400 [ 292.230564] do_vfs_ioctl+0x1de/0x1720 [ 292.234456] ? trace_hardirqs_on+0xbd/0x310 [ 292.238787] ? ioctl_preallocate+0x300/0x300 [ 292.243207] ? __fget_light+0x2e9/0x430 [ 292.247201] ? fget_raw+0x20/0x20 [ 292.250666] ? putname+0xf2/0x130 [ 292.254131] ? kmem_cache_free+0x21a/0x290 [ 292.258377] ? putname+0xf7/0x130 [ 292.261835] ? do_sys_open+0x3ac/0x700 [ 292.265736] ? security_file_ioctl+0x94/0xc0 [ 292.270156] ksys_ioctl+0xa9/0xd0 [ 292.273623] __x64_sys_ioctl+0x73/0xb0 [ 292.277528] do_syscall_64+0x1b9/0x820 [ 292.281418] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.286795] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.291735] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.296582] ? trace_hardirqs_on_caller+0x310/0x310 [ 292.301603] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 292.306632] ? prepare_exit_to_usermode+0x291/0x3b0 [ 292.311677] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.316534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.321728] RIP: 0033:0x457387 [ 292.324925] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.343831] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.351553] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000457387 [ 292.358836] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 292.366113] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 292.373412] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 292.380698] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:35 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext%\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xffef1000) [ 292.424758] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 12:55:35 executing program 4 (fault-call:4 fault-nth:17): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:35 executing program 3: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)={0x0, 0x3b, "aea3ec7fbd043c63c205852e209d081e42e6bb1d86711f9379ac0b9c637582a75c2bad12161b0c25132772a0d34f97ddfb67973dc0643f45f8f4a6"}, &(0x7f0000000200)=0x43) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000240)={r1, 0xc, "2ddf53840a93b5742b1b768a"}, &(0x7f0000000280)=0x14) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 292.466953] EXT4-fs (loop2): invalid inodes per group: 16384 [ 292.466953] 12:55:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x34}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2h', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:35 executing program 3: socket$can_bcm(0x1d, 0x2, 0x2) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0xffffffffffffffff, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000000c0)={0x2, 0x488}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) 12:55:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:35 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='extH\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 292.692025] FAULT_INJECTION: forcing a failure. [ 292.692025] name failslab, interval 1, probability 0, space 0, times 0 [ 292.712508] CPU: 0 PID: 12487 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 292.721054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.730415] Call Trace: [ 292.733021] dump_stack+0x244/0x3ab [ 292.736698] ? dump_stack_print_info.cold.2+0x52/0x52 [ 292.741930] should_fail.cold.4+0xa/0x17 [ 292.746029] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.751159] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.756729] ? wake_up_klogd+0x11a/0x180 [ 292.760817] ? console_device+0xc0/0xc0 [ 292.764807] ? vprintk_emit+0x322/0x930 [ 292.768803] ? __down_trylock_console_sem+0x151/0x1f0 [ 292.774010] ? vprintk_emit+0x268/0x930 [ 292.777998] ? wake_up_klogd+0x180/0x180 [ 292.782078] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 292.787642] ? kernfs_link_sibling+0x1d2/0x3b0 [ 292.792272] ? fs_reclaim_acquire+0x20/0x20 [ 292.796618] ? lock_downgrade+0x900/0x900 [ 292.800801] ? perf_trace_sched_process_exec+0x860/0x860 [ 292.806271] ? vprintk_default+0x28/0x30 [ 292.810359] __should_failslab+0x124/0x180 [ 292.814608] should_failslab+0x9/0x14 [ 292.818427] kmem_cache_alloc_trace+0x2d7/0x750 [ 292.823116] kobject_uevent_env+0x2f3/0x101e [ 292.827541] kobject_uevent+0x1f/0x24 [ 292.831360] lo_ioctl+0x1385/0x1d60 [ 292.835005] ? lo_rw_aio+0x1ef0/0x1ef0 [ 292.838902] blkdev_ioctl+0x9ac/0x2010 [ 292.842800] ? blkpg_ioctl+0xc10/0xc10 [ 292.846706] ? lock_downgrade+0x900/0x900 [ 292.850878] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 292.855826] ? __sched_text_start+0x8/0x8 [ 292.859986] ? __kasan_slab_free+0x102/0x150 [ 292.864415] ? __fget+0x4d1/0x740 [ 292.867880] ? ksys_dup3+0x680/0x680 [ 292.871605] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 292.877055] ? retint_kernel+0x1b/0x2d [ 292.880948] ? trace_hardirqs_on+0x310/0x310 [ 292.885360] block_ioctl+0xee/0x130 [ 292.888994] ? blkdev_fallocate+0x400/0x400 [ 292.893325] do_vfs_ioctl+0x1de/0x1720 [ 292.897213] ? trace_hardirqs_off+0xaf/0x310 [ 292.901625] ? retint_kernel+0x2d/0x2d [ 292.905524] ? ioctl_preallocate+0x300/0x300 [ 292.909935] ? __fget_light+0x2e9/0x430 [ 292.913937] ? fget_raw+0x20/0x20 [ 292.917399] ? kmem_cache_free+0x21a/0x290 [ 292.921635] ? putname+0xf7/0x130 [ 292.925101] ? do_sys_open+0x3ac/0x700 [ 292.928990] ? security_file_ioctl+0x94/0xc0 [ 292.933406] ksys_ioctl+0xa9/0xd0 [ 292.936865] __x64_sys_ioctl+0x73/0xb0 [ 292.940757] do_syscall_64+0x1b9/0x820 [ 292.944644] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.950026] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.954980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.959834] ? trace_hardirqs_on_caller+0x310/0x310 [ 292.964858] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 292.969877] ? prepare_exit_to_usermode+0x291/0x3b0 [ 292.974904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.979771] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.984968] RIP: 0033:0x457387 [ 292.988162] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.007070] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.014797] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000457387 [ 293.022079] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 293.029360] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 293.036639] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 12:55:35 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xffbf100000000000) 12:55:36 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r0, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="bee3e03c4e4ff0f883df5e2e1ce02b6656518fb089b5d2dca9637cac31fae2fb1ef4668ca7032934e05dd37a2c8482b9e839ba08eb9734cc730ccf657cd0865bf3595edd37442cc01cc3ad680620dfaa68cc0f251f356d12ac3c44d7ddeec8f676c700b8a0b50712838e326d00aa606b15da03c90ff2fada988f2ea3d5300c37785961c8942764be12ec1c66784807187c5f624a53fc038100cedc38e87cdcf59591d1899af605941dee6a4a8e8f5c6bdec2c26fe2e6", 0xb6) [ 293.043929] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xf401000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:36 executing program 4 (fault-call:4 fault-nth:18): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:36 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7, 0x20080) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000140)) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) sysfs$1(0x1, &(0x7f0000000280)='\'em0\x00') ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000100)) 12:55:36 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="657874ad00", &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2z', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 293.261477] FAULT_INJECTION: forcing a failure. [ 293.261477] name failslab, interval 1, probability 0, space 0, times 0 [ 293.299838] CPU: 0 PID: 12536 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 293.308412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.317778] Call Trace: [ 293.320391] dump_stack+0x244/0x3ab [ 293.324067] ? dump_stack_print_info.cold.2+0x52/0x52 [ 293.329289] ? is_bpf_text_address+0xd3/0x170 [ 293.333806] should_fail.cold.4+0xa/0x17 [ 293.337881] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 293.343026] ? save_stack+0xa9/0xd0 [ 293.346672] ? save_stack+0x43/0xd0 [ 293.350323] ? kasan_kmalloc+0xc7/0xe0 [ 293.354228] ? kmem_cache_alloc_trace+0x152/0x750 [ 293.359084] ? kobject_uevent_env+0x2f3/0x101e [ 293.363694] ? kobject_uevent+0x1f/0x24 [ 293.367709] ? lo_ioctl+0x1385/0x1d60 [ 293.371524] ? blkdev_ioctl+0x9ac/0x2010 [ 293.375623] ? block_ioctl+0xee/0x130 [ 293.379448] ? do_vfs_ioctl+0x1de/0x1720 [ 293.383526] ? ksys_ioctl+0xa9/0xd0 [ 293.387164] ? __x64_sys_ioctl+0x73/0xb0 [ 293.391242] ? do_syscall_64+0x1b9/0x820 [ 293.395310] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.400707] ? fs_reclaim_acquire+0x20/0x20 [ 293.406548] ? lock_downgrade+0x900/0x900 [ 293.410709] ? lock_downgrade+0x900/0x900 [ 293.414858] ? perf_trace_sched_process_exec+0x860/0x860 [ 293.420322] __should_failslab+0x124/0x180 [ 293.424560] should_failslab+0x9/0x14 [ 293.428361] __kmalloc+0x2e0/0x760 [ 293.431905] ? kobject_get_path+0xc2/0x1b0 [ 293.436146] ? kmem_cache_alloc_trace+0x31f/0x750 [ 293.440999] kobject_get_path+0xc2/0x1b0 [ 293.445066] kobject_uevent_env+0x314/0x101e [ 293.449480] kobject_uevent+0x1f/0x24 [ 293.453282] lo_ioctl+0x1385/0x1d60 [ 293.456913] ? lo_rw_aio+0x1ef0/0x1ef0 [ 293.460812] blkdev_ioctl+0x9ac/0x2010 [ 293.464712] ? blkpg_ioctl+0xc10/0xc10 [ 293.468603] ? lock_downgrade+0x900/0x900 [ 293.472758] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 293.477705] ? save_stack+0x43/0xd0 [ 293.481344] ? __kasan_slab_free+0x102/0x150 [ 293.485763] ? __fget+0x4d1/0x740 [ 293.489329] ? ksys_dup3+0x680/0x680 [ 293.493056] block_ioctl+0xee/0x130 [ 293.496696] ? blkdev_fallocate+0x400/0x400 [ 293.501027] do_vfs_ioctl+0x1de/0x1720 [ 293.504921] ? trace_hardirqs_on+0xbd/0x310 [ 293.509249] ? ioctl_preallocate+0x300/0x300 [ 293.513669] ? __fget_light+0x2e9/0x430 [ 293.517658] ? fget_raw+0x20/0x20 [ 293.521122] ? putname+0xf2/0x130 [ 293.524585] ? kmem_cache_free+0x21a/0x290 [ 293.528823] ? putname+0xf7/0x130 [ 293.532279] ? do_sys_open+0x3ac/0x700 [ 293.536169] ? security_file_ioctl+0x94/0xc0 [ 293.541583] ksys_ioctl+0xa9/0xd0 [ 293.545048] __x64_sys_ioctl+0x73/0xb0 [ 293.548944] do_syscall_64+0x1b9/0x820 [ 293.552841] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 293.558217] ? syscall_return_slowpath+0x5e0/0x5e0 [ 293.563159] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.568034] ? trace_hardirqs_on_caller+0x310/0x310 [ 293.573060] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 293.578083] ? prepare_exit_to_usermode+0x291/0x3b0 [ 293.583118] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.587978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 293.593170] RIP: 0033:0x457387 [ 293.596368] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.615277] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.622998] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000457387 [ 293.630276] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 293.637557] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 293.644838] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 293.652115] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) 12:55:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xa0008000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:36 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x142800}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xa8070000000000) 12:55:36 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext\n\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:36 executing program 4 (fault-call:4 fault-nth:19): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x5, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="d787eec7e103148fcf2162eb4ad402093082000000002b9800f724b53b507227fc4e47512ba021d4f2a29599e51037be461d68d96e2214797be7d54bf25f9cf1bc7f9cb01111ba3015ddea61def448d92a5aaca30000000000000000000000", 0x100ee) 12:55:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)="6578743202", &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x500}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x141000) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x2) [ 293.971998] FAULT_INJECTION: forcing a failure. [ 293.971998] name failslab, interval 1, probability 0, space 0, times 0 [ 294.002042] CPU: 1 PID: 12580 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 294.010587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.019950] Call Trace: [ 294.022565] dump_stack+0x244/0x3ab [ 294.026219] ? dump_stack_print_info.cold.2+0x52/0x52 [ 294.031429] ? console_unlock+0x832/0x1160 [ 294.035679] should_fail.cold.4+0xa/0x17 [ 294.039751] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 294.044861] ? mark_held_locks+0x130/0x130 [ 294.049100] ? lock_release+0xa10/0xa10 [ 294.053075] ? perf_trace_sched_process_exec+0x860/0x860 [ 294.058528] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 294.063564] ? fs_reclaim_acquire+0x20/0x20 [ 294.067889] ? lock_downgrade+0x900/0x900 [ 294.072037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.077581] ? put_dec+0x3b/0xf0 [ 294.080950] ? perf_trace_sched_process_exec+0x860/0x860 [ 294.086399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 294.091935] ? number+0x972/0xca0 [ 294.095396] __should_failslab+0x124/0x180 [ 294.099629] should_failslab+0x9/0x14 [ 294.103439] kmem_cache_alloc_node+0x26e/0x730 [ 294.108032] ? set_precision+0xe0/0xe0 [ 294.111934] __alloc_skb+0x114/0x770 [ 294.115662] ? netdev_alloc_frag+0x1f0/0x1f0 [ 294.120080] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 294.125008] ? pointer+0x990/0x990 [ 294.128550] ? device_get_devnode+0x2d0/0x2d0 [ 294.133054] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 294.138078] ? netlink_has_listeners+0x2cb/0x4a0 [ 294.142846] ? netlink_tap_init_net+0x3d0/0x3d0 [ 294.147522] alloc_uevent_skb+0x84/0x1da [ 294.151591] kobject_uevent_env+0xa52/0x101e [ 294.156004] kobject_uevent+0x1f/0x24 [ 294.159807] lo_ioctl+0x1385/0x1d60 [ 294.163445] ? lo_rw_aio+0x1ef0/0x1ef0 [ 294.167336] blkdev_ioctl+0x9ac/0x2010 [ 294.171221] ? blkpg_ioctl+0xc10/0xc10 [ 294.175108] ? lock_downgrade+0x900/0x900 [ 294.179272] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 294.184211] ? save_stack+0x43/0xd0 [ 294.187836] ? __kasan_slab_free+0x102/0x150 [ 294.192246] ? __fget+0x4d1/0x740 [ 294.195714] ? ksys_dup3+0x680/0x680 [ 294.199438] block_ioctl+0xee/0x130 [ 294.203068] ? blkdev_fallocate+0x400/0x400 [ 294.207389] do_vfs_ioctl+0x1de/0x1720 [ 294.211283] ? trace_hardirqs_on+0xbd/0x310 [ 294.215615] ? ioctl_preallocate+0x300/0x300 [ 294.220028] ? __fget_light+0x2e9/0x430 [ 294.224002] ? fget_raw+0x20/0x20 [ 294.227457] ? putname+0xf2/0x130 [ 294.230914] ? kmem_cache_free+0x21a/0x290 [ 294.235154] ? putname+0xf7/0x130 [ 294.238614] ? do_sys_open+0x3ac/0x700 [ 294.242504] ? security_file_ioctl+0x94/0xc0 [ 294.246918] ksys_ioctl+0xa9/0xd0 [ 294.250374] __x64_sys_ioctl+0x73/0xb0 [ 294.254264] do_syscall_64+0x1b9/0x820 [ 294.258156] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 294.263534] ? syscall_return_slowpath+0x5e0/0x5e0 [ 294.268469] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.273320] ? trace_hardirqs_on_caller+0x310/0x310 [ 294.278339] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 294.283367] ? prepare_exit_to_usermode+0x291/0x3b0 [ 294.288392] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.293243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.298429] RIP: 0033:0x457387 [ 294.301715] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.320621] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.328344] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000457387 [ 294.335615] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 294.342889] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 294.350159] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 294.357433] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:37 executing program 4 (fault-call:4 fault-nth:20): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) socket$inet6(0xa, 0x0, 0x6) 12:55:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:37 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)="6578742df6", &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:37 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x700}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 294.557858] FAULT_INJECTION: forcing a failure. [ 294.557858] name failslab, interval 1, probability 0, space 0, times 0 [ 294.573510] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 294.625155] EXT4-fs (loop2): invalid inodes per group: 16384 [ 294.625155] [ 294.666735] CPU: 1 PID: 12618 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 294.675269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.675277] Call Trace: [ 294.675303] dump_stack+0x244/0x3ab [ 294.675330] ? dump_stack_print_info.cold.2+0x52/0x52 [ 294.696077] ? is_bpf_text_address+0xd3/0x170 [ 294.700587] should_fail.cold.4+0xa/0x17 [ 294.704639] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 294.709743] ? save_stack+0xa9/0xd0 [ 294.713354] ? save_stack+0x43/0xd0 [ 294.716964] ? kasan_kmalloc+0xc7/0xe0 [ 294.720835] ? kmem_cache_alloc_trace+0x152/0x750 [ 294.725683] ? kobject_uevent_env+0x2f3/0x101e [ 294.730256] ? kobject_uevent+0x1f/0x24 [ 294.734212] ? lo_ioctl+0x1385/0x1d60 [ 294.737995] ? blkdev_ioctl+0x9ac/0x2010 [ 294.742045] ? block_ioctl+0xee/0x130 [ 294.745829] ? do_vfs_ioctl+0x1de/0x1720 [ 294.749871] ? ksys_ioctl+0xa9/0xd0 [ 294.753497] ? __x64_sys_ioctl+0x73/0xb0 [ 294.757549] ? do_syscall_64+0x1b9/0x820 [ 294.761603] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.766958] ? fs_reclaim_acquire+0x20/0x20 [ 294.771274] ? lock_downgrade+0x900/0x900 [ 294.775423] ? lock_downgrade+0x900/0x900 [ 294.779556] ? perf_trace_sched_process_exec+0x860/0x860 [ 294.784993] __should_failslab+0x124/0x180 [ 294.789222] should_failslab+0x9/0x14 [ 294.793021] __kmalloc+0x2e0/0x760 [ 294.796562] ? kobject_get_path+0xc2/0x1b0 [ 294.800790] ? kmem_cache_alloc_trace+0x31f/0x750 [ 294.805636] kobject_get_path+0xc2/0x1b0 [ 294.809701] kobject_uevent_env+0x314/0x101e [ 294.814111] kobject_uevent+0x1f/0x24 [ 294.817899] lo_ioctl+0x1385/0x1d60 [ 294.821513] ? lo_rw_aio+0x1ef0/0x1ef0 [ 294.825396] blkdev_ioctl+0x9ac/0x2010 [ 294.829279] ? blkpg_ioctl+0xc10/0xc10 [ 294.833164] ? lock_downgrade+0x900/0x900 [ 294.837318] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 294.842239] ? save_stack+0x43/0xd0 [ 294.845854] ? __kasan_slab_free+0x102/0x150 [ 294.850251] ? __fget+0x4d1/0x740 [ 294.853696] ? ksys_dup3+0x680/0x680 [ 294.857399] block_ioctl+0xee/0x130 [ 294.861022] ? blkdev_fallocate+0x400/0x400 [ 294.865336] do_vfs_ioctl+0x1de/0x1720 [ 294.869219] ? trace_hardirqs_on+0xbd/0x310 [ 294.873527] ? ioctl_preallocate+0x300/0x300 [ 294.877921] ? __fget_light+0x2e9/0x430 [ 294.881882] ? fget_raw+0x20/0x20 [ 294.885337] ? putname+0xf2/0x130 [ 294.888783] ? kmem_cache_free+0x21a/0x290 [ 294.893020] ? putname+0xf7/0x130 [ 294.896458] ? do_sys_open+0x3ac/0x700 [ 294.900329] ? security_file_ioctl+0x94/0xc0 [ 294.904724] ksys_ioctl+0xa9/0xd0 [ 294.908166] __x64_sys_ioctl+0x73/0xb0 [ 294.912044] do_syscall_64+0x1b9/0x820 [ 294.915917] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 294.921275] ? syscall_return_slowpath+0x5e0/0x5e0 [ 294.926207] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.931045] ? trace_hardirqs_on_caller+0x310/0x310 [ 294.936063] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 294.941065] ? prepare_exit_to_usermode+0x291/0x3b0 [ 294.946074] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.950908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 294.956080] RIP: 0033:0x457387 [ 294.959276] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.978165] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.985868] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000457387 [ 294.993124] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 295.000380] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 295.007640] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 295.014933] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 [ 295.053568] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 295.073640] EXT4-fs (loop2): invalid inodes per group: 16384 [ 295.073640] 12:55:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x10b000000) 12:55:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="88710fea39ae2c57c0dba29be7a0782f086be2e1ef7c223a049af9dbe610aec387ee934dfe37ea8e56928ec474f1f465f035bee038755791fa107dc7ab113faad104339273124864cf3de47678eb5de9f9c274434edc47e36552d5eb1b5f595059d69d4268269daa5d34a3c395a0ec9e16874acdf4cf4ca2394ca67de35cd6bd92401aec2059c3c3c6513203b9e83770eed99f9e388144f032a38309ed09e0735023074e0975ccd77f76a8ae378c7e3d7e2fc977f9fd46b9cfd7166e032a3b21b6faecd0566db220ba3626b64bf9c93a7beb146a7ab6b93d79ed20c322377bcac7f2b5400c58db", 0x71) 12:55:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:38 executing program 4 (fault-call:4 fault-nth:21): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:38 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 295.250638] EXT4-fs: 36 callbacks suppressed [ 295.250666] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 295.250666] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 295.250666] [ 295.251044] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 295.276308] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 295.290354] FAULT_INJECTION: forcing a failure. [ 295.290354] name failslab, interval 1, probability 0, space 0, times 0 [ 295.309710] CPU: 0 PID: 12663 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 295.318246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.327608] Call Trace: [ 295.330215] dump_stack+0x244/0x3ab [ 295.333858] ? dump_stack_print_info.cold.2+0x52/0x52 [ 295.339056] ? lock_downgrade+0x900/0x900 [ 295.343214] should_fail.cold.4+0xa/0x17 [ 295.347286] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.352401] ? rcu_softirq_qs+0x20/0x20 [ 295.356382] ? unwind_dump+0x190/0x190 [ 295.360286] ? is_bpf_text_address+0xd3/0x170 [ 295.364794] ? __kernel_text_address+0xd/0x40 [ 295.369298] ? unwind_get_return_address+0x61/0xa0 [ 295.374244] ? __save_stack_trace+0x8d/0xf0 [ 295.378588] ? fs_reclaim_acquire+0x20/0x20 [ 295.382929] ? lock_downgrade+0x900/0x900 [ 295.387084] ? kobject_uevent+0x1f/0x24 [ 295.391066] ? perf_trace_sched_process_exec+0x860/0x860 [ 295.396528] ? do_vfs_ioctl+0x1de/0x1720 [ 295.400602] ? ksys_ioctl+0xa9/0xd0 [ 295.404729] ? __x64_sys_ioctl+0x73/0xb0 [ 295.408801] ? do_syscall_64+0x1b9/0x820 [ 295.412872] ? fs_reclaim_acquire+0x20/0x20 [ 295.417232] __should_failslab+0x124/0x180 [ 295.421480] should_failslab+0x9/0x14 [ 295.425288] kmem_cache_alloc+0x2be/0x730 [ 295.429448] skb_clone+0x1bb/0x500 [ 295.432992] ? skb_split+0x11e0/0x11e0 [ 295.436895] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 295.441930] ? netlink_trim+0x1b4/0x380 [ 295.445912] ? netlink_skb_destructor+0x210/0x210 [ 295.450769] netlink_broadcast_filtered+0x110f/0x1680 [ 295.455979] ? __netlink_sendskb+0xd0/0xd0 [ 295.460234] ? pointer+0x990/0x990 [ 295.463790] ? device_get_devnode+0x2d0/0x2d0 [ 295.468303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 295.473867] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 295.479343] ? refcount_add_not_zero_checked+0x330/0x330 [ 295.484819] ? netlink_has_listeners+0x2cb/0x4a0 [ 295.489622] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 295.494691] netlink_broadcast+0x3a/0x50 [ 295.498767] kobject_uevent_env+0xa83/0x101e [ 295.503200] kobject_uevent+0x1f/0x24 [ 295.507036] lo_ioctl+0x1385/0x1d60 [ 295.510741] ? lo_rw_aio+0x1ef0/0x1ef0 [ 295.514644] blkdev_ioctl+0x9ac/0x2010 [ 295.518554] ? blkpg_ioctl+0xc10/0xc10 [ 295.522459] ? lock_downgrade+0x900/0x900 [ 295.526625] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 295.531581] ? save_stack+0x43/0xd0 [ 295.535217] ? __kasan_slab_free+0x102/0x150 [ 295.539638] ? __fget+0x4d1/0x740 [ 295.543113] ? ksys_dup3+0x680/0x680 [ 295.546846] block_ioctl+0xee/0x130 [ 295.550494] ? blkdev_fallocate+0x400/0x400 [ 295.554830] do_vfs_ioctl+0x1de/0x1720 [ 295.558731] ? trace_hardirqs_on+0xbd/0x310 [ 295.563081] ? ioctl_preallocate+0x300/0x300 [ 295.567495] ? __fget_light+0x2e9/0x430 [ 295.571496] ? fget_raw+0x20/0x20 [ 295.574960] ? putname+0xf2/0x130 [ 295.578425] ? kmem_cache_free+0x21a/0x290 [ 295.582676] ? putname+0xf7/0x130 [ 295.586143] ? do_sys_open+0x3ac/0x700 [ 295.590035] ? security_file_ioctl+0x94/0xc0 [ 295.594474] ksys_ioctl+0xa9/0xd0 [ 295.597939] __x64_sys_ioctl+0x73/0xb0 [ 295.601835] do_syscall_64+0x1b9/0x820 [ 295.605727] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 295.611093] ? syscall_return_slowpath+0x5e0/0x5e0 [ 295.616035] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.620891] ? trace_hardirqs_on_caller+0x310/0x310 [ 295.625916] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 295.630947] ? prepare_exit_to_usermode+0x291/0x3b0 [ 295.635997] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.640866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 295.646065] RIP: 0033:0x457387 [ 295.649265] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.668172] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 295.675895] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000457387 [ 295.683172] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 295.690453] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 12:55:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x9000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 295.697818] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 295.705100] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 [ 295.721443] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 295.721443] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 295.721443] [ 295.733669] EXT4-fs (loop2): invalid inodes per group: 16384 [ 295.733669] [ 295.737110] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:38 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000280)={0xffffffff00000000}, 0x1) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000002c0)=@int=0x2, 0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x25b) r2 = dup(r0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000200)=r2) write$P9_RWALK(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="16000002000000000100005109000000000000000000"], 0x16) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e28, 0x80, @empty, 0x6}, r3}}, 0x30) 12:55:38 executing program 4 (fault-call:4 fault-nth:22): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:38 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x1087ff) 12:55:38 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x5000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 295.793282] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 295.818307] EXT4-fs (loop2): invalid inodes per group: 16384 [ 295.818307] 12:55:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 295.912469] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 295.912469] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 295.912469] [ 295.928728] FAULT_INJECTION: forcing a failure. [ 295.928728] name failslab, interval 1, probability 0, space 0, times 0 [ 295.943060] CPU: 1 PID: 12693 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 295.951579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.960939] Call Trace: [ 295.963541] dump_stack+0x244/0x3ab [ 295.967183] ? dump_stack_print_info.cold.2+0x52/0x52 [ 295.972413] ? lo_ioctl+0xe6/0x1d60 [ 295.976051] should_fail.cold.4+0xa/0x17 [ 295.980115] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.985224] ? blkpg_ioctl+0xc10/0xc10 [ 295.989119] ? lock_downgrade+0x900/0x900 [ 295.993277] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 295.998215] ? save_stack+0x43/0xd0 [ 296.001843] ? __kasan_slab_free+0x102/0x150 [ 296.006256] ? __fget+0x4d1/0x740 [ 296.009719] ? fs_reclaim_acquire+0x20/0x20 [ 296.014046] ? lock_downgrade+0x900/0x900 [ 296.018207] ? perf_trace_sched_process_exec+0x860/0x860 [ 296.023672] ? block_ioctl+0xee/0x130 [ 296.027502] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.033047] __should_failslab+0x124/0x180 [ 296.037293] should_failslab+0x9/0x14 [ 296.041097] kmem_cache_alloc+0x2be/0x730 [ 296.045251] ? fget_raw+0x20/0x20 [ 296.048715] getname_flags+0xd0/0x590 [ 296.052524] do_mkdirat+0xc5/0x310 [ 296.056068] ? __ia32_sys_mknod+0xb0/0xb0 [ 296.060219] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.065585] ? trace_hardirqs_off_caller+0x300/0x300 [ 296.070703] ? ksys_ioctl+0x81/0xd0 [ 296.074338] __x64_sys_mkdir+0x5c/0x80 [ 296.078247] do_syscall_64+0x1b9/0x820 [ 296.082138] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.087516] ? syscall_return_slowpath+0x5e0/0x5e0 [ 296.092454] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.097311] ? trace_hardirqs_on_caller+0x310/0x310 [ 296.102333] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 296.107362] ? prepare_exit_to_usermode+0x291/0x3b0 [ 296.112396] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.117255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.122447] RIP: 0033:0x456957 [ 296.125642] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.144578] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 296.152300] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000456957 [ 296.159579] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 [ 296.166859] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 296.174136] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 296.181417] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 [ 296.194861] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="e777a420153a7d1430eab9a5357d9729629c4091f0054188dc2a596075dd5888bda48cda948c58ab15304c8aa57d2bc537f4cad39b7acc0d8d1dda2db52ef82d0578b8de9ee6de7d8e88a58e8017f41d5a5505b8e3736b58297760db1f3e7e18ed039f6d8576a70307c83c284578415d290a495f80a6271fdd484d0b37d4e848f7", 0xffffffffffffff16) [ 296.239996] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 296.252490] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 296.252490] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 296.252490] [ 296.280464] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue [ 296.290361] EXT4-fs (loop2): invalid inodes per group: 16384 [ 296.290361] [ 296.297970] EXT4-fs (sda1): Mount option "noacl" will be removed by 3.5 [ 296.297970] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 296.297970] 12:55:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x26a) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000100)=0x40) 12:55:39 executing program 4 (fault-call:4 fault-nth:23): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 296.336948] EXT4-fs (sda1): re-mounted. Opts: noacl,,errors=continue 12:55:39 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="ad56b6c5820faeb995298992ea54c7be", 0x10) r2 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000000040)=0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001300), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_submit(r3, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000500)='\x00', 0x1}]) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100), 0x0) [ 296.399742] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 296.415829] EXT4-fs (loop2): invalid inodes per group: 16384 [ 296.415829] [ 296.440979] FAULT_INJECTION: forcing a failure. [ 296.440979] name failslab, interval 1, probability 0, space 0, times 0 [ 296.452877] CPU: 0 PID: 12713 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 296.461389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.461395] Call Trace: [ 296.461424] dump_stack+0x244/0x3ab [ 296.461446] ? dump_stack_print_info.cold.2+0x52/0x52 [ 296.461462] ? lo_ioctl+0xe6/0x1d60 [ 296.461483] should_fail.cold.4+0xa/0x17 [ 296.461505] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 296.485881] ? blkpg_ioctl+0xc10/0xc10 [ 296.485903] ? lock_downgrade+0x900/0x900 [ 296.499031] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 296.499050] ? save_stack+0x43/0xd0 [ 296.508121] ? __kasan_slab_free+0x102/0x150 [ 296.508141] ? __fget+0x4d1/0x740 [ 296.508161] ? fs_reclaim_acquire+0x20/0x20 [ 296.523942] ? lock_downgrade+0x900/0x900 [ 296.528117] ? perf_trace_sched_process_exec+0x860/0x860 [ 296.533586] ? block_ioctl+0xee/0x130 [ 296.537783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 296.543348] __should_failslab+0x124/0x180 [ 296.547597] should_failslab+0x9/0x14 [ 296.551408] kmem_cache_alloc+0x2be/0x730 [ 296.555565] ? fget_raw+0x20/0x20 [ 296.559026] getname_flags+0xd0/0x590 [ 296.562840] do_mkdirat+0xc5/0x310 [ 296.566392] ? __ia32_sys_mknod+0xb0/0xb0 [ 296.570546] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.575924] ? trace_hardirqs_off_caller+0x300/0x300 [ 296.581038] ? ksys_ioctl+0x81/0xd0 [ 296.584685] __x64_sys_mkdir+0x5c/0x80 [ 296.588594] do_syscall_64+0x1b9/0x820 [ 296.592494] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 296.597871] ? syscall_return_slowpath+0x5e0/0x5e0 [ 296.602808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.607672] ? trace_hardirqs_on_caller+0x310/0x310 [ 296.612716] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 296.617740] ? prepare_exit_to_usermode+0x291/0x3b0 [ 296.622771] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.627627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 296.632830] RIP: 0033:0x456957 [ 296.636033] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.654942] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 296.662677] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000456957 [ 296.669959] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 [ 296.677264] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 296.684546] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 12:55:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x4002}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x4000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 296.691823] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x78000) 12:55:39 executing program 4 (fault-call:4 fault-nth:24): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x3f8f5}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 296.765370] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 296.779077] EXT4-fs (loop2): invalid inodes per group: 16384 [ 296.779077] 12:55:39 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-L', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:39 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r2 = dup3(r0, r1, 0x80000) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000140)={0x2, 0x7}, 0x2) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xa9, 0x258040) lseek(r0, 0x0, 0x1) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r3, 0x28, 0x2, &(0x7f0000000100)=0xf275380, 0x8) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000200)={0x2000}) listen(r3, 0x1686381) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xffffff7f00000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 296.863148] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 296.888436] EXT4-fs (loop2): invalid inodes per group: 16384 [ 296.888436] [ 296.915302] FAULT_INJECTION: forcing a failure. [ 296.915302] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 296.927154] CPU: 1 PID: 12741 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 296.935666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.945031] Call Trace: [ 296.947641] dump_stack+0x244/0x3ab [ 296.951302] ? dump_stack_print_info.cold.2+0x52/0x52 [ 296.956503] ? trace_hardirqs_off+0xb8/0x310 [ 296.960926] should_fail.cold.4+0xa/0x17 [ 296.964997] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 296.970108] ? kobject_uevent_env+0xf76/0x101e [ 296.974703] ? wait_for_completion+0x8a0/0x8a0 [ 296.979298] ? __kasan_slab_free+0x119/0x150 [ 296.983723] ? mark_held_locks+0x130/0x130 [ 296.987969] ? kobject_uevent_env+0x100d/0x101e [ 296.992651] ? mutex_unlock+0xd/0x10 [ 296.996381] ? lo_ioctl+0xe6/0x1d60 [ 297.000022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 297.005563] ? should_fail+0x22d/0xd01 [ 297.009454] ? blkdev_ioctl+0x15d/0x2010 [ 297.013520] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.018634] ? blkpg_ioctl+0xc10/0xc10 [ 297.022539] ? lock_downgrade+0x900/0x900 [ 297.026706] __alloc_pages_nodemask+0x34b/0xdd0 [ 297.031385] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 297.036419] ? save_stack+0x43/0xd0 [ 297.040054] ? __kasan_slab_free+0x102/0x150 [ 297.044474] ? __fget+0x4d1/0x740 [ 297.047944] ? fs_reclaim_acquire+0x20/0x20 [ 297.052274] ? lock_downgrade+0x900/0x900 [ 297.056438] ? trace_hardirqs_off+0xb8/0x310 [ 297.060860] cache_grow_begin+0xa5/0x8c0 [ 297.064929] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.070475] ? check_preemption_disabled+0x48/0x200 [ 297.075511] kmem_cache_alloc+0x66b/0x730 [ 297.079689] ? fget_raw+0x20/0x20 [ 297.083158] getname_flags+0xd0/0x590 [ 297.086972] do_mkdirat+0xc5/0x310 [ 297.090522] ? __ia32_sys_mknod+0xb0/0xb0 [ 297.094684] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.100057] ? trace_hardirqs_off_caller+0x300/0x300 [ 297.105173] ? ksys_ioctl+0x81/0xd0 [ 297.108817] __x64_sys_mkdir+0x5c/0x80 [ 297.112752] do_syscall_64+0x1b9/0x820 [ 297.116644] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.122032] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.126969] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.131826] ? trace_hardirqs_on_caller+0x310/0x310 [ 297.136851] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 297.141884] ? prepare_exit_to_usermode+0x291/0x3b0 [ 297.146914] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.151770] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.156965] RIP: 0033:0x456957 [ 297.160168] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.179084] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 297.186806] RAX: ffffffffffffffda RBX: 0000000020001810 RCX: 0000000000456957 [ 297.194102] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 [ 297.201381] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 297.208673] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 12:55:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 297.215951] R13: 0000000000000000 R14: 00000000004d7d28 R15: 0000000000000003 12:55:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x101400, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000200)=ANY=[@ANYBLOB="00004f137f930016a4aaa518497b061000002bd373008da7e046cac5cad7cbe1a82bcc00c9415f001dc42e013f6cd8f065606907fe798f7d387107af0c59d092effac91fc0a1114c4215b3bb8913d2fa06d01ee621e2e2ff15b8f0949230613506a803c6fcfc674d7d46f7bfa633fb8a2e031c9a88c8c3faa5a3a109c77fbfe86ae711f963aa89dc194ebba51987967a017c871944024b52c9c7b5b58cfaa94f41599cc4d553d64df2deefd285d7db544acf99e20558"]) 12:55:40 executing program 4 (fault-call:4 fault-nth:25): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x2000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 297.312994] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 297.331848] EXT4-fs (loop2): invalid inodes per group: 16384 [ 297.331848] 12:55:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x100000000000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:40 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext--', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 297.391779] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 297.411918] EXT4-fs (loop2): invalid inodes per group: 16384 [ 297.411918] [ 297.425822] FAULT_INJECTION: forcing a failure. [ 297.425822] name failslab, interval 1, probability 0, space 0, times 0 [ 297.467038] CPU: 0 PID: 12764 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 297.475586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.484944] Call Trace: [ 297.487543] dump_stack+0x244/0x3ab [ 297.491178] ? dump_stack_print_info.cold.2+0x52/0x52 [ 297.496369] ? save_stack+0xa9/0xd0 [ 297.499999] ? save_stack+0x43/0xd0 [ 297.503627] should_fail.cold.4+0xa/0x17 [ 297.507704] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.512806] ? kasan_check_read+0x11/0x20 [ 297.516958] ? do_raw_spin_unlock+0xa7/0x2f0 [ 297.521369] ? trace_hardirqs_on+0x310/0x310 [ 297.525790] ? trace_hardirqs_on+0x310/0x310 [ 297.530202] ? debug_check_no_obj_freed+0x305/0x58d [ 297.535222] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 297.540772] ? check_preemption_disabled+0x48/0x200 [ 297.545793] ? trace_hardirqs_on+0xbd/0x310 [ 297.550595] ? fs_reclaim_acquire+0x20/0x20 [ 297.554923] ? lock_downgrade+0x900/0x900 [ 297.559082] ? perf_trace_sched_process_exec+0x860/0x860 [ 297.564535] ? putname+0xf7/0x130 [ 297.567991] ? filename_create+0x2b7/0x5b0 [ 297.572234] __should_failslab+0x124/0x180 [ 297.576475] should_failslab+0x9/0x14 [ 297.580278] __kmalloc_track_caller+0x2d1/0x760 [ 297.584951] ? strncpy_from_user+0x5a0/0x5a0 [ 297.589356] ? strndup_user+0x77/0xd0 [ 297.593158] memdup_user+0x2c/0xa0 [ 297.596705] strndup_user+0x77/0xd0 [ 297.600333] ksys_mount+0x3c/0x140 [ 297.603872] __x64_sys_mount+0xbe/0x150 [ 297.607855] do_syscall_64+0x1b9/0x820 [ 297.611745] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 297.617120] ? syscall_return_slowpath+0x5e0/0x5e0 [ 297.622054] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.626898] ? trace_hardirqs_on_caller+0x310/0x310 [ 297.631915] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 297.636939] ? prepare_exit_to_usermode+0x291/0x3b0 [ 297.641960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.646806] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.651992] RIP: 0033:0x459f8a 12:55:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="2f6a7374617400c65381b47aaedf2af5c8af3423fc41891bd2a3c56d8c88e29bad43f1da906e855ff182de04227edcbbc2b1df8f180e158e8abd442cc049cffda030ff277875ee010000000000000000000000000000000000000000000000f532144d1671a6cdf5069e5bddcf25cd7f23956b4a82df900f5eb5763b4fe8cc7172962d2590b2dca2a1308c382541b053194d9027d83ee7ba2e3280857f8f9f63fc90bae959c6e67078bf97e615bfd9409914958aadcfb37973543c60d83526e5c267f7dfa54bd524cc9671dedd665199322bdadee125a35b40b7be0c07301f439a7edfa26fa98277c8078b02e2076291c33787c58b0eabbc39288fc10509409de108f5ca26a8c8e1afb70b2a9569cf8f4cdb6d4e97eb7fdf241dee160e6071618333cc0b0e8bc6a17a0b7d604550fd149ad078ffe54c6392fba29015a3ae73774cd12c9c0ed251a7cf843d712d", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0x70800) 12:55:40 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000001180)={0x200004, 0x85}) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000040)={0x1, 0x80000001, 0x23, 0x3f}, 0x10) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000011c0), 0x1a5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001100)={0x0}, &(0x7f0000001140)=0xc) ptrace$peekuser(0x3, r2, 0xffff) ioctl$FICLONE(r0, 0x40049409, r0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000100)=""/4096, &(0x7f0000000000)=0x1000) [ 297.655222] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 297.674128] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 297.681838] RAX: ffffffffffffffda RBX: 00007efcb5aecb30 RCX: 0000000000459f8a [ 297.689109] RDX: 00007efcb5aecad0 RSI: 0000000020000140 RDI: 00007efcb5aecaf0 [ 297.696375] RBP: 0000000020000140 R08: 00007efcb5aecb30 R09: 00007efcb5aecad0 [ 297.703643] R10: 0000000000000820 R11: 0000000000000206 R12: 0000000000000004 [ 297.710916] R13: 0000000000000820 R14: 00000000004d7d28 R15: 0000000000000003 12:55:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) 12:55:40 executing program 4 (fault-call:4 fault-nth:26): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x31e) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000100)) 12:55:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:41 executing program 3: r0 = semget(0x3, 0x4, 0x0) semop(r0, &(0x7f0000000040)=[{0x3, 0x156, 0x800}, {0x2, 0x400, 0x800}, {0x0, 0x8, 0x1800}, {0x2, 0x6, 0x800}, {}, {0x1, 0x9}, {0x3, 0xffffffff, 0x1800}, {0x3, 0x400, 0x1800}, {0x0, 0x6cb, 0x1800}, {0x3, 0x2a, 0x1800}], 0xa) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff529a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000), 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) 12:55:41 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) [ 297.874317] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 297.890906] EXT4-fs (loop2): invalid inodes per group: 16384 [ 297.890906] 12:55:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) [ 297.967452] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 297.983513] EXT4-fs (loop2): invalid inodes per group: 16384 [ 297.983513] 12:55:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\r', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 298.149803] FAULT_INJECTION: forcing a failure. [ 298.149803] name failslab, interval 1, probability 0, space 0, times 0 [ 298.171444] CPU: 1 PID: 12811 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 298.179978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.189345] Call Trace: [ 298.191959] dump_stack+0x244/0x3ab [ 298.195604] ? dump_stack_print_info.cold.2+0x52/0x52 [ 298.200807] ? bpf_prog_kallsyms_find+0xde/0x4a0 [ 298.205582] should_fail.cold.4+0xa/0x17 [ 298.209698] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.214819] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 298.219853] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 298.225146] ? rcu_softirq_qs+0x20/0x20 [ 298.229133] ? unwind_dump+0x190/0x190 [ 298.233032] ? is_bpf_text_address+0xd3/0x170 [ 298.237536] ? kernel_text_address+0x79/0xf0 [ 298.241957] ? __kernel_text_address+0xd/0x40 [ 298.246465] ? fs_reclaim_acquire+0x20/0x20 [ 298.250797] ? lock_downgrade+0x900/0x900 [ 298.254956] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.260414] ? save_stack+0xa9/0xd0 [ 298.264058] ? kmem_cache_alloc_trace+0x152/0x750 [ 298.268906] ? copy_mount_options+0x5f/0x430 [ 298.273328] __should_failslab+0x124/0x180 [ 298.277577] should_failslab+0x9/0x14 [ 298.281392] kmem_cache_alloc+0x2be/0x730 [ 298.285549] ? trace_hardirqs_on+0xbd/0x310 [ 298.289880] getname_flags+0xd0/0x590 [ 298.293697] ? fs_reclaim_acquire+0x20/0x20 [ 298.298031] user_path_at_empty+0x2d/0x50 [ 298.302200] do_mount+0x180/0x1d90 [ 298.305747] ? trace_hardirqs_on+0xbd/0x310 [ 298.310076] ? copy_mount_options+0x5f/0x430 [ 298.314493] ? copy_mount_string+0x40/0x40 [ 298.318736] ? kasan_unpoison_shadow+0x35/0x50 [ 298.323326] ? kasan_kmalloc+0xc7/0xe0 [ 298.327227] ? kmem_cache_alloc_trace+0x31f/0x750 [ 298.332083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 298.337628] ? _copy_from_user+0xdf/0x150 [ 298.341798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.347341] ? copy_mount_options+0x315/0x430 [ 298.351851] ksys_mount+0x12d/0x140 [ 298.355492] __x64_sys_mount+0xbe/0x150 [ 298.359477] do_syscall_64+0x1b9/0x820 [ 298.363371] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 298.368744] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.373692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.378557] ? trace_hardirqs_on_caller+0x310/0x310 [ 298.383591] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 298.388626] ? prepare_exit_to_usermode+0x291/0x3b0 [ 298.393690] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.398556] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.403757] RIP: 0033:0x459f8a [ 298.406962] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 298.425893] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 298.433621] RAX: ffffffffffffffda RBX: 00007efcb5aecb30 RCX: 0000000000459f8a [ 298.440908] RDX: 00007efcb5aecad0 RSI: 0000000020000140 RDI: 00007efcb5aecaf0 12:55:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xe8030000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:41 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)="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", 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0xfb, &(0x7f0000000080)=""/251}, 0x48) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)="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", 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffffffffffff28, &(0x7f0000000840), 0x0, &(0x7f0000001580)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)=0xffffffff00000000) [ 298.448181] RBP: 0000000020000140 R08: 00007efcb5aecb30 R09: 00007efcb5aecad0 [ 298.455468] R10: 0000000000000820 R11: 0000000000000206 R12: 0000000000000004 [ 298.462802] R13: 0000000000000820 R14: 00000000004d7d28 R15: 0000000000000003 12:55:41 executing program 4 (fault-call:4 fault-nth:27): getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000001440)=@assoc_value, &(0x7f0000001500)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000009d40)={{{@in=@multicast1}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000009e40)=0xe8) mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x13, 0xa, 0xfffffffffffffffa) getsockopt$inet_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000140)=""/61, &(0x7f0000000200)=0x3d) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000100)={'bridge_slave_0\x00', 0x8664}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) 12:55:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0xffffeff7}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000180)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="800000000002000019000000e60100006c000000000000000100000001000000004000000040000080fdffffff0000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000100)=ANY=[]) [ 298.639794] FAULT_INJECTION: forcing a failure. [ 298.639794] name failslab, interval 1, probability 0, space 0, times 0 [ 298.658743] CPU: 0 PID: 12842 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 298.667273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.676671] Call Trace: [ 298.679287] dump_stack+0x244/0x3ab [ 298.682934] ? dump_stack_print_info.cold.2+0x52/0x52 [ 298.688141] ? kernel_text_address+0x79/0xf0 [ 298.692561] should_fail.cold.4+0xa/0x17 [ 298.696632] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.701752] ? save_stack+0xa9/0xd0 [ 298.705385] ? save_stack+0x43/0xd0 [ 298.709021] ? kmem_cache_alloc_trace+0x152/0x750 [ 298.713869] ? vfs_new_fs_context+0x5e/0x77c [ 298.718284] ? do_mount+0xb70/0x1d90 [ 298.722001] ? ksys_mount+0x12d/0x140 [ 298.725805] ? __x64_sys_mount+0xbe/0x150 [ 298.729955] ? do_syscall_64+0x1b9/0x820 [ 298.734027] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.739410] ? trace_hardirqs_on+0xbd/0x310 [ 298.743741] ? putname+0xf2/0x130 [ 298.747209] ? fs_reclaim_acquire+0x20/0x20 [ 298.751539] ? lock_downgrade+0x900/0x900 [ 298.755701] ? fs_reclaim_acquire+0x20/0x20 [ 298.760036] ? perf_trace_sched_process_exec+0x860/0x860 [ 298.765493] ? lockref_get+0x42/0x50 [ 298.769220] ? lock_downgrade+0x900/0x900 [ 298.773382] __should_failslab+0x124/0x180 [ 298.777625] should_failslab+0x9/0x14 [ 298.781444] kmem_cache_alloc_trace+0x2d7/0x750 [ 298.786130] ? kmem_cache_alloc_trace+0x31f/0x750 [ 298.790987] legacy_init_fs_context+0x187/0x230 [ 298.795678] ? vfs_dup_fs_context+0x400/0x400 [ 298.800186] vfs_new_fs_context+0x3f4/0x77c [ 298.804527] do_mount+0xb70/0x1d90 [ 298.808082] ? copy_mount_string+0x40/0x40 [ 298.812323] ? kasan_unpoison_shadow+0x35/0x50 [ 298.816910] ? kasan_kmalloc+0xc7/0xe0 [ 298.820807] ? kmem_cache_alloc_trace+0x31f/0x750 [ 298.825673] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 298.831244] ? _copy_from_user+0xdf/0x150 [ 298.835403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 298.840951] ? copy_mount_options+0x315/0x430 [ 298.845462] ksys_mount+0x12d/0x140 [ 298.849100] __x64_sys_mount+0xbe/0x150 [ 298.853082] do_syscall_64+0x1b9/0x820 [ 298.856977] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 298.862350] ? syscall_return_slowpath+0x5e0/0x5e0 [ 298.867287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.872142] ? trace_hardirqs_on_caller+0x310/0x310 [ 298.877168] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 298.882190] ? prepare_exit_to_usermode+0x291/0x3b0 [ 298.887222] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.892075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.897266] RIP: 0033:0x459f8a [ 298.900469] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 298.919398] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 298.927117] RAX: ffffffffffffffda RBX: 00007efcb5aecb30 RCX: 0000000000459f8a [ 298.934391] RDX: 00007efcb5aecad0 RSI: 0000000020000140 RDI: 00007efcb5aecaf0 [ 298.941674] RBP: 0000000020000140 R08: 00007efcb5aecb30 R09: 00007efcb5aecad0 [ 298.948953] R10: 0000000000000820 R11: 0000000000000206 R12: 0000000000000004 [ 298.956223] R13: 0000000000000820 R14: 00000000004d7d28 R15: 0000000000000003 [ 298.972695] BUG: unable to handle kernel paging request at fffffffffffffff4 [ 298.977720] kobject: 'loop2' (00000000ed9c8234): kobject_uevent_env [ 298.979827] PGD 926d067 P4D 926d067 PUD 926f067 PMD 0 [ 298.991523] Oops: 0000 [#1] PREEMPT SMP KASAN [ 298.996031] CPU: 1 PID: 12842 Comm: syz-executor4 Not tainted 4.19.0-rc7-next-20181011+ #92 [ 299.001318] kobject: 'loop2' (00000000ed9c8234): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 299.004530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.023330] RIP: 0010:do_mount+0xb98/0x1d90 12:55:42 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000300000000000000000000819500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) sendto$packet(r3, &(0x7f0000000040)="d6", 0x1, 0x400c0, &(0x7f00000072c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x9}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14}, 0x5580}}, 0x0) 12:55:42 executing program 1: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000540)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000100)='ext-\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001800), 0x820, &(0x7f0000000240)={[{@noacl='noacl'}]}) 12:55:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200, 0x0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18, 0x0, 0x6, {0x1}}, 0x18) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000), 0x0) [ 299.027673] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 299.038419] kobject: 'loop3' (00000000ba55d086): kobject_uevent_env [ 299.046587] RSP: 0018:ffff88017e15fc28 EFLAGS: 00010246 [ 299.046601] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90009eca000 [ 299.046609] RDX: 1ffffffffffffffe RSI: ffffffff81e08e2c RDI: 0000000000000282 [ 299.046617] RBP: ffff88017e15fdb0 R08: ffff8801bf33a2c0 R09: fffffbfff12e2050 [ 299.046625] R10: fffffbfff12e2050 R11: ffffffff89710283 R12: ffff8801cb88da30 [ 299.046633] R13: ffff8801c9fdaac0 R14: ffff8801c9fdaac0 R15: ffff88017e654e40 [ 299.046644] FS: 00007efcb5aed700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 299.046652] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 299.046670] CR2: fffffffffffffff4 CR3: 00000001d11bb000 CR4: 00000000001406e0 [ 299.046681] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 299.046688] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 299.046693] Call Trace: [ 299.046719] ? copy_mount_string+0x40/0x40 [ 299.046731] ? kasan_unpoison_shadow+0x35/0x50 [ 299.046744] ? kasan_kmalloc+0xc7/0xe0 [ 299.046768] ? kmem_cache_alloc_trace+0x31f/0x750 [ 299.076392] kobject: 'loop3' (00000000ba55d086): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 299.080373] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 299.080391] ? _copy_from_user+0xdf/0x150 [ 299.080411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 299.107504] kobject: 'loop2' (00000000ed9c8234): kobject_uevent_env [ 299.109083] ? copy_mount_options+0x315/0x430 [ 299.109100] ksys_mount+0x12d/0x140 [ 299.109119] __x64_sys_mount+0xbe/0x150 [ 299.194044] do_syscall_64+0x1b9/0x820 [ 299.197937] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 299.203306] ? syscall_return_slowpath+0x5e0/0x5e0 [ 299.208264] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.213133] ? trace_hardirqs_on_caller+0x310/0x310 [ 299.218159] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 299.223186] ? prepare_exit_to_usermode+0x291/0x3b0 [ 299.228221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.233075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 299.238264] RIP: 0033:0x459f8a [ 299.241459] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 299.260363] RSP: 002b:00007efcb5aeca88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 299.268084] RAX: ffffffffffffffda RBX: 00007efcb5aecb30 RCX: 0000000000459f8a [ 299.275352] RDX: 00007efcb5aecad0 RSI: 0000000020000140 RDI: 00007efcb5aecaf0 [ 299.282621] RBP: 0000000020000140 R08: 00007efcb5aecb30 R09: 00007efcb5aecad0 [ 299.289891] R10: 0000000000000820 R11: 0000000000000206 R12: 0000000000000004 [ 299.297164] R13: 0000000000000820 R14: 00000000004d7d28 R15: 0000000000000003 [ 299.304439] Modules linked in: [ 299.307635] CR2: fffffffffffffff4 [ 299.311099] ---[ end trace cd1001fc08e1bbaf ]--- [ 299.315859] RIP: 0010:do_mount+0xb98/0x1d90 [ 299.320184] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 299.339096] RSP: 0018:ffff88017e15fc28 EFLAGS: 00010246 [ 299.344471] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90009eca000 [ 299.351741] RDX: 1ffffffffffffffe RSI: ffffffff81e08e2c RDI: 0000000000000282 [ 299.359018] RBP: ffff88017e15fdb0 R08: ffff8801bf33a2c0 R09: fffffbfff12e2050 [ 299.366292] R10: fffffbfff12e2050 R11: ffffffff89710283 R12: ffff8801cb88da30 [ 299.373565] R13: ffff8801c9fdaac0 R14: ffff8801c9fdaac0 R15: ffff88017e654e40 [ 299.380845] FS: 00007efcb5aed700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 299.389072] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 299.394955] CR2: fffffffffffffff4 CR3: 00000001d11bb000 CR4: 00000000001406e0 [ 299.402692] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 299.409967] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 299.417239] Kernel panic - not syncing: Fatal exception [ 299.423545] Kernel Offset: disabled [ 299.427170] Rebooting in 86400 seconds..