0x2, 0x8, 0x81, "9fa640d86e73eecdd9adebe702a00e8a5f43e6218eb06b3b0e0580b22245b14baf0ea4974673e52d29392e009230d639cc64a5753a1452faebd63fab4f656f", 0xf}, 0x60, &(0x7f0000000dc0)=[{&(0x7f0000000bc0)="c0196d3b1530f848fc17c89c4b34d9728f75859b2ca409fc40606b722dd8723b20afe7e90d1a415772b1049477baa03f0db03a15ce5fd91e2165aaf2acd2c7b80ab14970bef1678d5aa3837a33da1e2225bcbb51ff837a72f39999ad91f03e5e62f48af90122ea2b353f8347ba6fff1fd5e103046dae2c88de2df254210a6537de0dff51b28405ff80391d2d412b9d497cc79fc1a60b8eaa80d997d2e6d034def5d3973f1b7d961256cdfe195a567cc72af90aaf0228bd9922b219091b023a065fbdd5ff10d02c27e15d2334593857b9d543811f4d1a41bad92f48217a23ce55688ad9cecb2eeafa0f317cacf21a887c5135", 0xf2}, {&(0x7f0000000cc0)="fc1bebeb106d517c29a2f9607e6d16fe9aeb65666bcfa12612025a6121debe2cacb8368cb7582cf81364fc2592ed2b516e8f4303d50a25ec1a6e7af29377558ca8b476f8a87ab569538442ae49969f3bdd91aefabfe37dd655bd97e650680d88dfa70a94e440d34e78cfb9c1f942b9605fa439e49c4bff58aad35dbfb0cea4df189787e43f1a2c56766bd7703ee5eeb0b260d0b691334612eb3f89419595ee8361a7f85e39a0f5d0176d188e433a8e253debd91d5faeb2c2c7c0fddbe8c872c5315207452e9fbf2f8b326d2b0df64e4796746e3db74f10aa4633e3253d8587f1730955be5ee3ae5f01c80ff5a9bf31", 0xef}], 0x2, 0x0, 0x0, 0x80}], 0x4, 0x20000000) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x440000, 0x0) ioctl$ION_IOC_ALLOC(r9, 0xc0184900, &(0x7f0000000100)={0x100000000}) syz_open_procfs(r8, &(0x7f0000000000)='sched\x00') [ 347.019916] EXT4-fs (loop3): group descriptors corrupted! 17:32:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 347.094113] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 347.132838] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:19 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x7, 0x5}, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3, 0x9, 0x6}, &(0x7f0000000140)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 347.154822] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 not in group (block 6881287)! [ 347.186325] EXT4-fs (loop3): group descriptors corrupted! 17:32:19 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="75f18f816932b97966e21a6c9600"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0xece6f79a9a6c5916, 0x0) ioctl$SNAPSHOT_FREE(r1, 0x3305) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$USBDEVFS_FREE_STREAMS(r7, 0x8008551d, &(0x7f0000000180)={0x2af2, 0xd, [{0x3}, {0xb}, {0xe}, {0xc}, {0x6, 0x1}, {0x7}, {0xc}, {0x9}, {0x5}, {0x7, 0x1}, {0x5}, {0x1}, {0xa, 0x1}]}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKALIGNOFF(r4, 0x127a, &(0x7f00000000c0)) fchown(r0, 0xee00, 0x0) [ 347.376940] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 347.395703] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:20 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0831f796d638db4a9976246376697a0a00d7c01d0b0a9bafd32affa7bd9b24cb6204ff7b4af3e1798630a4d888239e92a2a0d48255faa8e2874c361729507d5f4cf591b97c6374a2157637021e69c958305d72042b54322a1de588011d512f15f88e8d56c21ef726e72ad8e8fabc8586b3d651bea03634895f10c005a26dd80bab4c758d3200b3f141bd732795fd5b046fc542310e4ace13a89d76568265cddcebfda6c2e94b6eb03b52490ea7ecfdbad73ce7361a19"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r3, 0x111, 0x4, 0x1, 0x4) [ 347.478233] EXT4-fs (loop3): Unrecognized mount option "ui2yfl" or missing value [ 347.487612] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 347.547586] EXT4-fs (loop3): Unrecognized mount option "ui2yfl" or missing value 17:32:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753d", 0x63}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0200004182d869c80000"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) fchown(r0, 0xee00, 0x0) [ 347.717711] EXT4-fs (loop2): Unrecognized mount option "18Jv$cviz [ 347.717711] " or missing value [ 347.755479] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 347.827851] EXT4-fs (loop2): Unrecognized mount option "18Jv$cviz [ 347.827851] " or missing value 17:32:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:20 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000080)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$IOCTL_STATUS_ACCEL_DEV(r5, 0x40046103, &(0x7f0000000180)={0x6, 0x0, 0x40, 0x8, 0x0, 0x20, 0x22, 0x8, 0xf7, 0x40, 0x1f, "d73b2b9e6da7c3f6332e7931df05e13ac58ee1cd23b7167cb006609df08bd239"}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f00000000c0)=0xde2d, 0x4) fchown(r0, 0xee00, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) recvfrom$l2tp(r2, &(0x7f00000007c0)=""/4096, 0x1000, 0x0, &(0x7f0000000140)={0x2, 0x0, @loopback}, 0x10) [ 347.903279] EXT4-fs (loop3): Unrecognized mount option "" or missing value [ 348.012845] EXT4-fs (loop3): Unrecognized mount option "" or missing value 17:32:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4a7883bb22bf588f81e54d9", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655bd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x80040, &(0x7f0000000040)={[{@data_err_ignore='data_err=ignore'}]}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) [ 348.059419] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 348.128434] EXT4-fs (loop2): Mount option "noacl" will be removed by 3.5 [ 348.128434] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 348.128434] 17:32:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753d", 0x63}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 348.203983] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 348.218147] EXT4-fs (loop2): mounted filesystem without journal. Opts: noacl,,errors=continue 17:32:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:20 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) fchown(r0, 0xee00, 0x0) [ 348.392548] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 348.481012] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 348.501893] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:32:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f00000000092e040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:32:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753d", 0x63}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 348.681279] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 348.827807] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:32:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x100000000, 0xffffffffffffffff}) [ 349.008015] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 349.039367] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:32:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:21 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xdbe, 0x10400) write$FUSE_LK(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, {{0x17, 0x782, 0x0, 0xffffffffffffffff}}}, 0x28) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:32:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a", 0x94}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 349.240149] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x10040000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 349.358438] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:32:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040)=0x100, &(0x7f0000000080)=0x4) fchown(r0, 0xee00, 0x0) [ 349.419363] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 349.476109] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x16000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a", 0x94}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 349.696848] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:32:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee01, 0x0) [ 349.830386] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 349.972009] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:32:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@ng={0x4, 0x1, "2f4d168d57d9498ef360"}, 0xc, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000140)={@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x32}}, 0x0, 0x3, 0x2, 0x2}}, {&(0x7f0000000300)=""/231, 0xe7}, &(0x7f0000000040), 0x60}, 0xa0) mount(&(0x7f00000000c0)=@sg0='/dev/sg0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='omfs\x00', 0x22004, &(0x7f0000000480)=']\xbe]++\'%\x00') fchown(r0, 0xee00, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) [ 350.021768] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a", 0x94}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 350.220313] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 350.265279] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:22 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x404}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) mmap$snddsp_status(&(0x7f0000ff9000/0x4000)=nil, 0x1000, 0x2, 0x13, 0xffffffffffffffff, 0x82000000) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x9, 0xc4041) sendmsg$AUDIT_GET_FEATURE(r1, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x3fb, 0x400, 0x70bd2a, 0x25dfdbff, "", ["", "", "", "", "", ""]}, 0x10}}, 0x20048000) fchown(r0, 0xee00, 0x0) 17:32:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:23 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x10000, 0x28000) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000080), &(0x7f0000000100)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000), 0x4) fcntl$addseals(r2, 0x409, 0x6) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000b00)={0x2, &(0x7f0000000ac0)=[{0xbc5, 0x81, 0x3f, 0x2}, {0xf000, 0x81, 0xf7, 0x3c}]}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) r5 = getpid() r6 = perf_event_open(0x0, r5, 0x9, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r6, 0x84009422, &(0x7f00000013c0)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f00000017c0)={r7, 0x7, 0x0, [0x5, 0x80000000, 0x7f, 0x8, 0x100000001], [0x1000, 0x8, 0x9, 0x2, 0x9, 0x200, 0x1, 0x7, 0x541, 0x8, 0x1a45, 0x8000, 0x3, 0x8, 0x2, 0x7, 0xa47, 0x9, 0x7131, 0x6, 0x24f, 0x29, 0x6, 0x7, 0x8, 0x1ff, 0xcf, 0x0, 0x80, 0x1000, 0xffffffffffff5683, 0x3, 0x4, 0x2, 0x10000006, 0x3f, 0xffffffffffffffff, 0x2, 0xffffffff, 0x9, 0x1ff, 0x1, 0xff, 0x0, 0xd, 0x7fffffff, 0x7, 0xfffffffffffffff7, 0x0, 0x0, 0x80000000, 0x3, 0x40, 0x1000, 0x4000000, 0x401, 0x7f, 0xf1, 0x8000, 0x1000, 0xef6, 0x7, 0x2, 0x400, 0x7, 0x9, 0x0, 0x1, 0x100000001, 0x10001, 0x24, 0x46f7537, 0x91c7, 0x800, 0x7, 0x9cd2, 0x1f, 0x20, 0x1, 0x1, 0x7, 0x1000100, 0xf3, 0x80000000, 0xb0, 0xffffffff, 0x1, 0x1, 0x0, 0x2, 0x78b, 0x4, 0x5, 0xbee, 0x20, 0x0, 0x6, 0x5d, 0xffffffffffffff1a, 0x20, 0x2, 0x6, 0xe22, 0x5, 0x0, 0x6, 0xfffffffffffffff7, 0x7c7, 0x6000, 0x7fff, 0x7, 0x5, 0x1ff, 0x3, 0x1, 0x200, 0x81, 0x800, 0x0, 0x5afa]}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r3, 0xc400941d, &(0x7f0000000280)={0x0, 0x0, 0x47f0}) ioctl$BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000680)={0x2, 0x2, {0x1, @struct={0x1, 0x400}, 0x0, 0x100000001, 0x6, 0x4, 0x7, 0xbd3, 0x6, @usage=0x200, 0x20, 0x6, [0x3f, 0x1, 0x2, 0xca1, 0x3, 0x5]}, {0x1, @struct={0x80000000, 0x9}, r7, 0x20, 0x1, 0x4, 0x9161, 0x1a, 0x0, @struct={0x6, 0x5b}, 0x10000, 0x43e, [0xfff, 0x0, 0x1, 0x8, 0x9, 0xd5b2]}, {0x1, @usage=0x14, r8, 0x300000000000000, 0x4, 0x800, 0x5, 0x40, 0x1, @usage=0x5, 0x1, 0xffff81ab, [0x8, 0x80000001, 0x800, 0x9, 0xbdcc, 0x1]}, {0x7fff, 0x800, 0xff}}) r9 = openat$mice(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/input/mice\x00', 0x400) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r9, 0xc0086423, &(0x7f0000000240)={r10, 0x2}) [ 350.451292] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 350.469889] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 350.563870] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 350.582527] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2d000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(0xffffffffffffffff, 0x8004551a, &(0x7f0000000040)) 17:32:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x1411, 0x400, 0x70bd29, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x3}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040014}, 0x4000000) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91f908b381e88c679de56490444f8f55", 0xad}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) [ 350.892455] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 350.921508] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:32:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) sendmsg$NL80211_CMD_JOIN_OCB(r5, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x54, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1ff}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2c}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x6}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x7}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x80}]}, 0x54}, 0x1, 0x0, 0x0, 0x400c4}, 0x44004) 17:32:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:23 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d1f4655fd1f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f00000000c0)="ed41000000ed0000d0f4655fd1f4655fd1f4651f000100000000040002fdac2e177d", 0x22, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) r1 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) fstat(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r4) r5 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) fstat(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r6) setuid(r2) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000340)='./file0\x00', 0xf6b, 0x3, &(0x7f0000000500)=[{&(0x7f0000000380)="c71b0d7c9718745986d0fdcedb94d0634f5be0baea85adba33686bf913b3c2e8091e2e0a2f404e746e02e5fd14440115b594f53607349fc70e786160be4f8fb46408ae31b73565a182e29c2aa9d856d7436f70bf8fe7065668c26fb6f199a0b36c0f84694352d2ce171f661cf4c47e4d61", 0x71, 0x9}, {&(0x7f0000001540)="51a17cbea9f81b352a7f305dd86d5c69f701bfc13592791fd184ff7c4d9a4a9cbb018b9c75e25178a925783138a1443ce78e45279d943f01aaaeac92146383b69eecf91aa1c5e5aae4b6c3c775f533ce884bf6ad7928f887d21f85daaa42296b7d6d1882a6073d4c7e7f6f8ad0fb4cdff29dadd66f9da1b1c48da8c21f0aca98d0acdb50ca846bd8fc27e6db1c1b5cc0e6cacf6451d8909df00519e3ba252f7ae8ae3b8963fba337c4901909d5faa5265d86dca19edecdb99725b7918084309d9d66b2602d0a9add3bcd8ae391f1c9063debba54687f97e815f94125a09935df3e6654d437d3b8bf92dacd91303ad2d64a796fb2213189ab7bbe5a681f34666285e55fe9c940a3197b2211dd0cea8a0a26da8bf9447d565485d3f1e4d0cc1a991fd6b8a60fa8f5ee941cabffcd59e25aa7a0a95c3e42948f3ebae711fa578bd04453acf66b12a907a0e17252c0de9db43e26068113fd5810bb7c124ae0638a3f4bece4b0d3d794cd0edc59e654b37f9dfa7d25d861e30a1892ac0e8c9207a18789f8bc98b104b23b9d20b20f4ade9c7a31ae996ffdd090506fa81b22bd0ccc2925c311d5260ef9781b3d53a063f385fae689409a30ff37b1f1b4c90c685eef544dc750d37a7a7a4becdb5b136343bf2a17acc82d36de73a720458f377f7dc32154f618f9f946f15e042275d93d14f3bcb03c3530690736071a7295b716def5053eb6728265e31993caaac989a86da9d4646ae2742dca5659ae71591911acb19883883a4a48d431bb5c3305a919366e9d7cbb01627e6680385d05dc3ae7d4b04a1c17569bf6def5009fc3242a63cd26a3efab70a1bbe95f0bcdd9ac7969fcdaef55bbe4af7a2e32828febd9ebb73dcd82400aad19434df665510e59a6819f503b9f851a9bbbb35bb43e0bde472ed6438916ce1f592cf1065de949b3c773ce953b662ac83a34e27b7507336f9018f1da55741b708bfd1f96cb97a017fde28d5e0267ff0be7a16d4bb531603e9a08b43ee2f2fa9ebf701b2b3ed8949d7b1d2edc8fd7f2fd93b2a2b66fce0621ab52db3ea9ec235b69d289e3e1631e052ffe6c8fdb6bebc6982b0c3ffb98347c6ab2bb04538c1a581061339db0b8813b4a0ed80a463b17cb107fc7a891263854ea0adbb3ee843ddca3c9dfbd46b49e59a5424f16ad03d0903935372513132b960c75b9aafbc38bc978cc7f8a71bff92b435fca30ac894f9439e25e03da2edeb6b964f40601cae1b4292dd083b75681cfaab8d2d6ec59f9b0bdc2383b8b82fd0e260063f9f7db49e258dd4f429a6e251cd89fb9a788ddc3c58b6cd6f8a63e5c9c74a61182d3616dabdb378cf236f11a7d4ff4a231254158cc436291eca4a8f1866cb1622a59808dd86ccaac86de623fedd1a1aa3cc7daae924fc42257c95f8ba4e859baa90d3d7062fa6342f32618ea28dfb81e04636cfef88178cc02fe1fb7be682284677564ac86f69863be30af6141e4c9a110511bdcedd28bdb7e898b14959f8dce0322f3034502eef26fc9d7b66fd368cefd07e59c37d5e9bb3dc269297797ba350cc6ea3800f9416c3e4086a9e2adea6abee8b1360e2f5be612551b8882d4b0089e95176bc4c20438b7b24b87f7c865168d8a89042bfcfd5e8be0eb5b2ae9e0266f52a85b5c2f23437198905e37f5fab1ad160f32e4d837d34fe15d935080a6c55d96334d648075cce1c580ead605708100d78e461c260a6a0f8222ca05358dc125722fef72109059f73eb30198070b019ecade9a2893202661c4ea40871ba7e5335296fa08bf40ca7f4112135317b6eef5103805ab96dddfb8fa59877b40d09274797fdc89f6a00e979a9f37b4a1f68186cf746f932764e419f091edfb49990883034bb99c5eeeb719561e298fb3cd6a5dda14f097f7a5a5623ecff862c2afa677e92b4006095ecd9da1e06e597604491177b2b0d12c068167d77502149569eebe4b030a476f63f996cad757d291adbb4edaade37c438aadc9deeba07202a4180511c865a8f5dcbba53f7e44006d39f6d4732338949266495685c3276bacafa4ac71a2d8aab057c1450eda89d6af4ad671e6e6c88746df79a70fa436a43afa7782cab9436f49f68d226504f275bd0863ae7e6be0ad3548cce4793bc227986a05f97913c1f206e262c0d0ea061926d54f6e11165b8675953971bd9dae87f92839c2577de3e1e323cf16aa14d7d76fe302b8b5d24b20ec878db3408b26a4660321da065d4ddc5dd4eac27b2f7ebe9df3d5cf5eb2de086080458079e2c212e86d76789b4b76ebfb3a98cb7a28f8d71ae0b409e4e724c17ed560ccbd589ed77cfa6bbe762338a76a8fc5b21638b6e7dd367a40d927f1dcd24ae18222de6cf6605fb1dd42def2e56a35f976a1945a74dbd1a120eaaeff3a91b0197d0e69f6dbbaa245bdbeac2431d5fea58adc2ea6d455176d8d5ea7b0080697691660975d5e87b7e96b8852ab8a8c7f962bf3979cff095088010ccfe4406da8826d0dc02fdc56e377b656d9c810d178ba6575d872b72249181c09abf79929d932441d633a87bfeb32e6a25f7bdcfb4177fff2a873b4f87b2911519e9a09ec4e33523875190c64310974e8a5445cb1457fcb6742232eaf68a1ebb9a086e0fc8335afacbbb69a668327286659ba9e492bff87928c35dac8d66386b0a1f70dc8daf3922402a339a8ad552d89c1711a628d6dfb6bf40d40cdfe813b33e5b7600b4ea8b54304340080e5ba7d8b92c34fcb8a6438a04c6d20c3cbbd8bf23375ea8a0f98374699f71c2381488b4c2ab409995e4dbb5e7cc26ce003b4bd6f6f7e503856667dffdf423c3e44d6b99068ef206bff2d33edb86aef0b4205c4196bceee1439497416930a9fa322569ac97178d91c284dc2ec52c19c164cb8ebda8e6e5a771acf3f299c441f66c6f68abee256a8f0eb1e401ea739e9d2955c19cc6ae6c2bb75e886a3284daeaf6ffdf4ca940de300797098572bead614c8df87dfc95279a47d2af906296abc99b5611bfe7a938cc25f440599b3d4dd6fb6f1383ec1df2f33829dbd2441132e020298bb049483db3198f09da7fcda121daa650a00d5e15da2ef40ae8692987343eed8879881c21434f51024e5c2c3d1f355b519306a9b24cf110add1a625e558d3a4359d7691e702422db125f3e7112fdd88b2c7270ec33dffa2a0a13fd543f664cc22ae1a717e8e0fd097db5b6c62073b884afe08145c26a4d8250125aaeca4fbc2048a20b5138240eb0ea097107e57045434048c9ac098a36a65c2be22e7c3f5c0a7797fec043591ca5ac6ecf719937d45354326fea5c3f5a017fd87c05c0a0bb01e56b77f5734151a0db1e402756ff37710ac4aed57b8c82e77d59860740ba8c7f3661a8d923f25ee29fd179e18c05b2d16ac7f614bc66f4a36168d33a94c8a29c9498ba9ddb70ab818f6698f50caa2c13ea599e9e6f2964ea2912c0083e44261e4eb0453193a222bba7f0a9c048dbe5da92281e61bf986aa4bde09c5c2a551b7d1b72ea08e550cf989d69503d272cf1c1f3facf77e64b18b5ff15037819bf520614ede48b4fc04cf596ff203d223de887f6109807223688b24c81eab646062d361042a4d0104cce86229c7f7a72950d48137b17f6db48bc45f684008e2b67b9d08f6bfdd24568d7f104d8ee4e0e80f31979e6154ef99abf99a58bb10bafde0d8de4bc218f565c6d8eef38426b1003a67f1b5039660aac8ac6b76e29e0cb7955d23b7b3c88f2a4d944d4d01b231e8d727759c4cf02503ec29e0c3c15994853fb3c904d1d9e04a88535c209a2bc0c2a25bb68ff7e7c5950593225b8b346a57ba820dd7e67829ee899fd4254fc971d0723adfe1702bfd511cd1bc1d15b6659fe3d01d80dbcab231fdc6f3e70b579cce04754bcdd511a3c67ed8dbcdf7d7f3f29c5acc5877eaaa87f3bb55cfcef1695c3255d06e9cf412e3f01fb7b2898948110156f2077d3ad3c1846ad970e45bcaa9cbc47667bddc9a02157aba185fbd508acd966207c9a881bfe23cfa535f5128c03f3e643ff5830b13f92e205012d2db55a431efb20fdfd2ef6a33d4f5b52d17f6863bc6e6602e3faa3debea04ae60dbbcd23ee2226a2728a185d75cf28760f5110bc951a04274512284a3570b6fe97627a97e90e5785135c6de36e0cdbadafd11ca7506e00377ade5fa9050d3f0e625dc82c0b26e0f4f2bdaaf0345066df0a45dcedb2e58c54e30e21d01757c85c3d51aa87590fa6f026b134f36ced3bb2e86b0ccfa8c8ce21781118c23ed811ab49416e7cdbec767b2c8be7e97cf455d589296c3caf066325edd30c6964c71d052e5abbe1730d4b1a62e350faa9ec25e9e17066eaa8983fd99246a6bd048d336b6f11c61ad8b95183c21970baf515f1c22201f96dcc61eff380d333b423e4a8ad0ed2df0908d4278ba7f0fe3528e1253e4f6a9de23a2e94282033b7a9f0bf391298d8ac9f73fe1236122fc829005b20c559a2c816376a391d7dba465e53f9d0b7a2760ae04b0117d76dadea1a4e0e5e050d18569310d023a67eae1c0689f9bde75d8edeaa8b0d8f908dd64bed993d50ab1f660448475c6046ff9e4871a8a37a46ab849aae282d21144687e866a4e772eb7acac421e01edea9406473d3ffa802d5fa3b674860f5e66d2520974d85477aceb8736729e5da6bf2d47ce4190f34a89b7a05d18c1a2e6ee5c4d66d09acb9c4b522357d69e08b100af074b06bbc7a478b43dfad68c3b554ebfdb12316fb7542ad3750581ad6b50b6cbf2a06fd76d49270024cc7a63254df9a9b000fe8111fd4bf42d2f83d10f2a368b9e6f1f9b15179babf60800d03b2014265397a6441ff04f5bd3595f406eedcdcd7348774cb8656f5cd057c2e36b304c2387cde150388eee343a66af1244b594888ad40cc204f3c8cbb685b748f31ce21d575525956e54b8f66c5f19b19f10f738a31b4098ee4235d66ec8af26a6efed2d117fbbe40d11a8998bb4030c92c5567276fd11ed65be60a4ef461ae3038a4f205ad48e1e0db56b2a617e2b7b6602d604b85ca9c5bc455dd2c819f7250c6cf5db07f6d196a7514b3e056f28372a68251f4e5a6846074160106ccbcd778867b36bc25681d58f72c2ff74faf563091d6cdfd157461ef0d208befa5cc33074d3138f7a71383f2cba91c996e8976ad967acc6da86974b02f240219fdb36c4b5b0d064c09e09ae5d73a5b2a264a29a6438b93880bf67ef2756b7307834f6dae58729ff547ee7c8abc4979f7c773489026a785966b3101faac35fdb622b072c54bd6013887e269ae458e8bf7594a95a3235aef548d1e421890f7e4681364659a2b2822a3535bb564afa97c002e02c15da48b7c8d17764fb71188bc00a29c8c32e103c21511891f2d3561f322a588727f54df23a021b4d1db9dc3b34084c16dc546f1ba37977364d9ac6f754330cae7ceb10dcefcf9f015bde4bcc0377b051ab193bbc8d8dc4b4b6bd36090cbcbee9df6572fbc9a2ff867c65bcd276b5f970f4b17fefcee9463faa96adbd9ff56cfb20e723f05b5dcc123b89a6723216bfba3a41b7c3ea2dab1162d74e44738976793f75b66fd7afd759c152d637d3ad78f0edefb2e8845ab22f1f33422a2c45f9e2523bac432c9fb4565511d2d4bc6be6ea69c6fc04385a5544220ce6c78cfae60c06469b490e82a8093ba28ff4eeb78664d47a465bf28cef25f421c85b519fd086b547708ff562ac8263cbba477827c5c39756267c3f86b2d7ad7a6f4cb636a93c0d78b298c6f55dda96f69c21c5b7e1918a34d75b598f27a0bb6272d2a783220da5fd4b9", 0x1000, 0x3}, {&(0x7f0000000400)="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", 0xfd, 0x8001}], 0x4008, &(0x7f0000000580)=ANY=[@ANYBLOB="726573697a65e25744676f72733d72656d6f756e742d723030303030303030303030303034302c71756f74612c75737271756f74612c696f636861727365743d69736f383835392d362c657569643d00"/90, @ANYRESDEC=r2, @ANYBLOB=',appraise,seclabel,\x00']) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x240000, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000006c0)={&(0x7f0000000640)='./file0\x00', r7}, 0x10) syz_mount_image$udf(0x0, 0x0, 0x9, 0x2, &(0x7f0000001500)=[{0x0}, {&(0x7f0000000440), 0x0, 0x401}], 0x60000, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1004}, 0xc, &(0x7f0000000080)={&(0x7f0000000280)={0x50, 0x0, 0x10, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x100}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x80}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x2}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x800) fchown(r0, 0xee00, 0x0) [ 351.177063] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:23 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07", 0x95}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 351.321526] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:32:24 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[@ANYBLOB="02"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000080)={0x200, 0x4d, 0x4, 0xfffd}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r2, &(0x7f0000000180)) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r4 = fcntl$dupfd(r1, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$rfkill(r4, &(0x7f0000000040), 0x8) [ 351.411806] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 351.475610] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) exit_group(0xc474) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4109f7d9, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10) r3 = fcntl$dupfd(r1, 0x0, r2) sendto$llc(r3, &(0x7f00000001c0)="431f7db1d03e5d94c7232dd2f34d9c7bbd1fe00896a948acfb8790054b27ed4dc5d1607924b43f8fbda62d45f648171a26ed14b9cf4ec7b134447f3389b4ad5a8f5f8e292cc83224390bd4951bd531b5c44cd6936a7790bed0b9872d6429d88a55acd17bba3fb5e5f146eb82a6b4e90a0974f29eee8a4bb96c2d1e", 0x7b, 0x800, &(0x7f0000000080)={0x1a, 0x30e, 0x81, 0x7f, 0xff, 0x81, @multicast}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0xfffffffe, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) [ 351.655424] EXT4-fs (loop3): Unrecognized mount option "" or missing value [ 351.776601] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0), 0x4) sendmsg$NL80211_CMD_FRAME(r3, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)={0x7ac, 0x0, 0x300, 0x70bd29, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME={0xc1, 0x33, @action_no_ack={@with_ht={{{0x0, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x1f}, @device_b, @broadcast, @random="683492d2bc60", {0x1}}, @ver_80211n={0x0, 0x3f, 0x3, 0x2}}, @tdls_teardown={0xc, 0x3, {0x28, {0x37, 0x87, {0x8, 0x3, "ef4b4bc054603b10527437510ef166dc", "85afa369e066f0a8f08822cec2bffa2a96ecedca26cb7c1487d2ee0941bbb8e7", "9c611ebdf81bab8e8f06c00d97c76cf01d11e2f9bb02bc85af65ed04fa943d74", [{0x4, 0x1, ']'}, {0x4, 0x1d, "3fc8ab7174e9c90e25d27f80dcfa1ad3ed95514ed92a57008a70b098a5"}, {0x3, 0x11, "c100190d47e42ec030ea7174472da91b9b"}]}}, {0x65, 0x12, {@from_mac=@broadcast, @broadcast, @device_b}}}}}}, @NL80211_ATTR_DONT_WAIT_FOR_ACK={0x4}, @NL80211_ATTR_FRAME={0x4e, 0x33, @auth={@with_ht={{{0x0, 0x0, 0xb, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1}, {0x8}, @device_b, @device_b, @from_mac, {0x0, 0x7f}}, @ver_80211n={0x0, 0x2, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x1, 0x1, 0xd, @val={0x10, 0x1, 0xe3}, [{0xdd, 0x23, "40e49d86d1b086326a7bbd468b30e214da17ec9cdc8dac872e99fe61e62cd26afdb787"}]}}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x1d7}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_FRAME={0x515, 0x33, @assoc_resp={@with_ht={{{0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1}, {0x1}, @broadcast, @device_a, @initial, {0x6, 0x9}}, @ver_80211n={0x0, 0x2, 0x2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x0, 0x33, @default, @void, @val={0x2d, 0x1a, {0x300, 0x0, 0x0, 0x0, {0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1}, 0x300, 0x400, 0x6}}, [{0xdd, 0x74, "5d9f1ca186b0a85d74fbce8089b60bba99e81f2616926fc89e675f45ee5546c2866258a8deb9b2998801ddc051b91922ac859e974c9ac80dbee1cd332521871bd093c50783a415953234997217a6bf62e0d7ff68794521678d448b85c5e12b8c31f1edd89396d695605822f37f883319f20c06de"}, {0xdd, 0x97, "8054f68df0ad8f511218de4d72a76cdfaf23b067849382520d232c9a800f7b279763f95c554364e58048abf135f808211061ee8478dbd180b762f88cb7acb51a6b2e55909431040ad15ea28e40182059f132f14600fd6a0ecc2e61cae49245df31e36db8fd7fdbeee926a25c5169c765d40302a4151db56f60de5ab487695ab6e934293f6a02932a72a91f61a66438ab7880b255f5c272"}, {0xdd, 0x1f, "e34afcb639cb3373bece0d5660befc492f53d5f25f76e9d407e5917bd92829"}, {0xdd, 0xad, "947665f3b12c1788621a4c0e38c164e969577e5f363133a4c1c2f6abd3f95a29a7fcbc6dc9922a8f4145e3db1f42783b496f0d50b60a7267f05f1b6ff6438663dfc1b4e32490041b9d1bf88673fe9093d78e9d00b4fb113c182090a32c2a047a2a0053f40d4822124db165ed50c5ab376c32fa757dd89efde820958483f8e9ed791a278cd9e5ffe85d088be325cd991fd2de5f4752fef36c33f87af61da3bcc12831be024fa0cfa9a66d6d2c1c"}, {0xdd, 0x5d, "997d9aa21880a1e9b0f1e111b7e1a098a8eccac266538148382175a68d7c03bf50fbff94ae5d92767c398ce95939754cdec08dbf2b4997e6b1dfbc212964e25bbcee53cceb1346e6a971ced7c8b3819e9eb57e538755799f013edb9e75"}, {0xdd, 0xb0, "341a7527a8a9687100f2e55c2ad689fdff64553a9d96a61c4b109192087215fcb057a519e1c560aa18f7509e7507619e51dbdfd6ee1d6ab75645a5ddf5599b2e4198734d6c256dc56d56341a32f89c27df7256aabf95c9456239a7ab73bfef0bfdce16e92642e2942af371c7ce27c413b0b1546102c26423c3c94c22b674e6c28010f0bcec3107f267e63ba4d532d37735a128df9c488be31ac24a8d0efbf02f6995106d26ff07543c29c07b50494336"}, {0xdd, 0x2c, "320611ddf72d15d7615a62d3d591b00ddb2355d8f92409a12d098609ba6c05166bc204ed26a781445e48fbc8"}, {0xdd, 0xba, "1a7ef21c8f98e31bed884f8b2ec7ee02cd84af58cc4365845fb8fe6b10d208651a535689fa8fbdb6ad3b7dcf4b9eb38fd05f5cd2e8d273931c58064a372f613810cebb50ec9cdfbd59088aecbc12b2e923d98d9f946e0179b64de8a45b3791b151c8aaf602fb332f6ecf5104f330a5a68b257a84aed0dfb9656ddb97e2067e5ed28ddcf3398b0859e47aa4cee99608ba3ce07c50d123d90dcf910946620d83be020b6c74295483de3842653cd8c58334f4154cf14da40e5f6caf"}, {0xdd, 0xf7, "ab06d3a2dcdbae85a303aa6576b713751b30bd891eb649125406a2161040fb81b0696089210aa40fc518c29a5a5a434f4cf0b93de6c1233d3501afecc7faa3a5dc99cb4d6869b671201f2277610105bdf0e624016a1fc2c5360551480a3105e0c84488a4e50551427d35479617999f04b9bfd32881a7d8d233b1325d3bb8808e9b99b3237fbcee48640c007c76917b9715f0eef83b1852369d7b9bdf836d6c47790105b50eecd3863ddfd0507f006943faec0f04d81e2495043a0ecde366674e274b1bce34cee3f5aec2c5168f436594e16ad4996f24820f849b9aebededbaca99eeaed41ea5ddfbea1b2aab45986be4b4e86294f028d7"}]}}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xa}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1a}], @NL80211_ATTR_FRAME={0x13d, 0x33, @probe_response={@wo_ht={{}, {0x2}, @device_a, @broadcast, @random="e450cf4005cf", {0x4, 0xaef}}, 0xf8e, @default, 0x8204, @val={0x0, 0x1e, @random="2616025fc5cc9854753c46dce9bbaaf7e24970920da9f07a6c749569cdaf"}, @val={0x1, 0x1, [{0x60, 0x1}]}, @val={0x3, 0x1, 0x6}, @val={0x4, 0x6, {0x3, 0x1, 0x2, 0x5}}, @val={0x6, 0x2, 0x7fff}, @val={0x2d, 0x1a, {0x800, 0x2, 0x3, 0x0, {0x9, 0x8, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1}, 0x1, 0x8, 0x3f}}, @val={0x72, 0x6}, @val={0x71, 0x7, {0x0, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x80, 0x9}}, [{0xdd, 0xb4, "9a1292f063c92e010dc24bb1c8a64a8da706880451f5c21c666d240589ecf727bf7920ad1f9d869837989e3748e06698d20d65e30f1648717c7b1ca475d50d94d625a6a6660bc54f06a861332c670333c9b9644ea6b4707014b5d4a5291b5a0a669ed4c5ee17879df5ca34125cb260ca2f4b182015758cac1edef06a00745534ef6478be20b590b7a9354d33575622eeeec9fc2089890a33344c6585182203cb414c9fb5da9b37194e1bc269be55b098709086e4"}]}}, @NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}]}, 0x7ac}, 0x1, 0x0, 0x0, 0x20008042}, 0x930d31fd17713385) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07", 0x95}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:24 executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0xa5f8, 0x3, 0x2}) recvmsg$can_raw(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/245, 0xf5}, {&(0x7f00000002c0)=""/223, 0xdf}, {&(0x7f0000000400)=""/251, 0xfb}], 0x3, &(0x7f0000000500)=""/242, 0xf2}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2209c0, 0x0) ioctl$TUNGETIFF(r4, 0x800454d2, &(0x7f0000000600)={'veth0_to_bond\x00'}) r5 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) [ 352.018871] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 352.115188] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$inet6_tcp_int(r5, 0x6, 0x2, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x2, 0xfffffffffffffd64) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07", 0x95}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 352.402347] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r6 = accept(r5, 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x60000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91f908b3", 0xa1}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 352.623321] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 352.850592] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07", 0x95}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r4) r5 = fcntl$dupfd(r1, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) r6 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="cb56b6cc0407008b65d8b4ac0aa35c66", 0x10) r7 = accept4(r6, 0x0, 0x0, 0x0) sendmmsg$sock(r7, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r8, 0x0, r9) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x15, 0x0, &(0x7f0000000080)) [ 353.097987] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 353.194468] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) chroot(&(0x7f0000000500)='./file0\x00') syz_mount_image$ocfs2(&(0x7f0000000000)='ocfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)="2c7d9368888f36692492e9d93445a9ad1a08d31caacf082aa0716a1c6d44da7eb4956942fda7c83464628d04811bb74f67741e4bc25e421c488f61534673984c81def4e61dd859e5b44d0fe70cb13dd153408eae83a517a8c872b75669049023ba6cc6b84f3f64d15b4169a1f827cb35ab447157f23d815ea6aef4", 0x7b, 0x5}, {&(0x7f0000000240)="1c8b1f08797d34e7f089448d3e48073bfefee4b46ff7776fecb935c67a04cf9e9f0989f74e70891d4d9274e0141b41b508efbd9158bd167329f14a65426fd459f34dbdbc8183969093d49eee6a7d41d446e9cfa51d186a81fe60c96bdb9f2c4d002659b0e0487f3c65882c9ff7ae31a6e61534d54f96224d33a346d56385976a2b3e51829cedbc997415aa8805da4040284537965aff49eee2a2aefeebc2bf935e94c57238bac15972387c7d141261b7abe020679d3367714a3cae5412739742e617f6227e77b335fef6677b9c5460202cbe985479b97143b634ec3c27e70e", 0xdf, 0x7072}, {&(0x7f0000000400)="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", 0xff, 0x99}], 0x40000, &(0x7f0000000080)=ANY=[@ANYBLOB='*%++(,pcr=0000000000080,\x00\x00\x00\x00\x00\x00\x00\x00']) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$SIOCAX25DELUID(r5, 0x89e2, &(0x7f0000000100)={0x3, @null}) 17:32:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07", 0x95}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 353.467491] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 353.682046] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) setresgid(0x0, r4, 0xee00) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07", 0x95}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 353.908555] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_SET_GUEST_DEBUG(r6, 0x4048ae9b, &(0x7f0000000000)={0x50001, 0x0, [0x1, 0x3, 0x3, 0x2, 0x0, 0x8f, 0x7, 0x4]}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ptrace$cont(0x20, 0xffffffffffffffff, 0x6, 0xffffffff) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) [ 354.159145] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f0", 0x9b}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) timer_delete(0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) [ 354.408973] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000080)={0x29, 0x37, 0x1, {0x2, 0x100000000, 0xd38, 0xffffffffffffffff, 0xb, '/dev/nvram\x00'}}, 0x29) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x401, 0x0) write$apparmor_current(r3, &(0x7f0000000040)=@profile={'changeprofile ', '\x9e%\'\x00'}, 0x12) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000400)={0x0, 0x0, {0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xd9f70941, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f0", 0x9b}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$SIOCX25SFACILITIES(0xffffffffffffffff, 0x89e3, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) syz_open_procfs(0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x1c9002, 0x0) sendfile(r5, r4, 0x0, 0x7ffff000) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r6 = dup2(r2, r3) setsockopt$packet_buf(r6, 0x107, 0x5, &(0x7f0000000400)="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", 0x1000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) [ 354.686578] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x30a00, 0x0) ioctl$TIOCGPKT(r4, 0x80045438, &(0x7f0000000040)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) [ 354.924052] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f0", 0x9b}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0xfffffffffffffffb, 0x101a00) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000380)='scalable\x00', 0x9) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) r5 = socket(0x1e, 0x5, 0x7) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e21, 0x1f, @private1={0xfc, 0x1, [], 0x1}, 0x10001}}, 0x3, 0x8, 0x40, 0xffffffdd, 0x4000000}, &(0x7f0000000100)=0x98) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) [ 355.108644] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) [ 355.331538] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="0e0002000000f1ff0f00f3ff240008801c000100ff00cd0204000000000000001fffffff200000000000000004000200060005007f01000006000500e12c0000"], 0x58}, 0x1, 0x0, 0x0, 0x20000015}, 0x4c004) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup2(r0, r0) write$P9_RLCREATE(r4, &(0x7f0000000000)={0x18, 0xf, 0x1, {{0x40, 0x4, 0x4}, 0x3}}, 0x18) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x301000, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$EVIOCGABS0(r5, 0x80184540, &(0x7f0000000300)=""/118) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r4, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="2f51a4a34ac79ac6b3b8ebaf773be00756ac5df9772710792c6719371abb079d74ce0d2887697a275ac2949f123d2fec62106d44316327aeeb8c27489bcbfbec75d8768a8ae677edc3c4f59c5b6c05c763bb11ca6d8e3e8b25d78eedf408842f1858ccd42c7ae442ca2acb1cf2fbd58563b1fc62a34a53031286b9b4f5822a7e4490cc3f9debcdd38aea1300"/154, @ANYRES16=0x0, @ANYBLOB="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"], 0x20}, 0x1, 0x0, 0x0, 0x840}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x2, 0x4) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) [ 355.565581] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r3, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="42ff0000", @ANYRES16=r4, @ANYBLOB="000128bd7000fbdbdf258200000008000300", @ANYRES32=r5, @ANYBLOB="40ec6061efcae251521e143592e58b89a00b419adb66a62eaaccaff99b75e662ebaac266ed00"], 0x1c}, 0x1, 0x0, 0x0, 0x2005c094}, 0x4000041) [ 355.725431] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0xfffffffffffffd56) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 355.970424] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x30f, 0x10141) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$sock(r6, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000100)={0x980000, 0x800, 0x0, r6, 0x0, &(0x7f0000000080)={0x9909d8, 0x1, [], @value64=0x101}}) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f0", 0x9b}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 356.134895] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffff0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 356.240773] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 356.436551] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x141400, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(r5, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x6000001}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="440000005212d5f267131406a9ae79e9b1ceeb2261089e8882de3c69895c09c09b2343443fe01ce1f1b251018a2a18649bf8d24d6063bbf9424514f5b31c9916e8334308f7acf61e1cb6870734a89c63f496866137e9bfa9bdb259355d16e312070659c5f18c92eed3e628c74ebfb2f6c8c1cfab7c35c7d72706248a2678d4f78dec4d116f706609d7ffa17b6f0ca98b2ff92ef3a4fd943cb345e8791f48910348c3e95196c07f65726b26e157c4cfea7c88dc", @ANYRES16=0x0, @ANYBLOB="100029bd7000fddbdf2503000000080002000200000008000200020000000800010003000000080001000300000008000200020000000800020002000000"], 0x44}, 0x1, 0x0, 0x0, 0x20008000}, 0x40080) r6 = accept4$llc(r3, &(0x7f0000000200), &(0x7f0000000240)=0x10, 0x800) r7 = fcntl$dupfd(r4, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x4, 0x7, 0x7f, 0x80, 0x25, @remote, @empty, 0x1, 0x20, 0x8, 0x2}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f0", 0x9b}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 356.624212] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 356.857649] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f0", 0x9b}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 357.067726] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 357.174725] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 357.346435] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d", 0x9d}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 357.546770] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d", 0x9d}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 357.740906] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 357.790129] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 358.005201] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000300)="61fb9a0680b3e7b37442704347f1", 0xe}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d", 0x9d}], 0x5, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 358.294673] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 358.513471] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 358.706848] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {0x0}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 358.922210] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 359.030018] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {0x0}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 359.214524] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 359.407924] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {0x0}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 359.559236] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 359.778015] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 360.054527] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xc000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 360.152098] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 360.287333] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 360.463482] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 360.525301] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 360.673501] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 360.761410] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553", 0x4f}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 360.928789] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 361.074350] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 361.248598] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553", 0x4f}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 361.412597] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 361.557693] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553", 0x4f}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 361.730600] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 361.969975] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba7", 0x77}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 362.106300] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 362.212492] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1004000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 362.365028] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba7", 0x77}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDCTL_SEQ_NRSYNTHS(r3, 0x8004510a, &(0x7f0000000000)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)=0x672, 0x4) prctl$PR_GET_NO_NEW_PRIVS(0x27) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f0000000080)=""/52) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_SET_CPUID(r6, 0x4008ae8a, &(0x7f0000001440)=ANY=[@ANYBLOB="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"]) r7 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/timer\x00', 0x3) r8 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)=0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r8, 0x5000943f, &(0x7f0000000240)={{}, r9, 0x2, @unused=[0x2], @name="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"}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r7, 0xc0c89425, &(0x7f00000002c0)={"b9dd13cca87f33ece9dba3cd8e7e5e46", r9, 0x0, {0xfb, 0x29b1}, {0x10001, 0x3}, 0x4, [0xb606, 0x5, 0xfff, 0x40, 0x0, 0x50f, 0x7, 0x8000000000000000, 0x100, 0x2a, 0x1, 0x100000003eff, 0x507f, 0x564, 0x0, 0x8]}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) [ 362.518033] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 362.661871] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) pwritev2(r1, &(0x7f0000000100)=[{&(0x7f0000001000)="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", 0x1000}, {&(0x7f0000000080)}, {&(0x7f00000002c0)="f5432441dbdc0848e187291225c80e79b4e35bca016e4917e37d958c086e3bc06922132de1bac59d8f694f5670dead3e5c222dfee9b79ab1265342748a72740408dc45c3c3e9d0c7ef8e5f98365920f9889b0decf576a3f438d564d3f7d664d65c8498f5a413ca6d1ecd17baee0d9e36245d5f5a423579ff93f95b987bebb0dd2cb6fdab6c11e965d7b5d07f0c88ae34320e4f539bf1cf5b4b28c830cf1f4fa54c200ff220c00e4acd04cf8c5050", 0xae}], 0x3, 0xfffff6fc, 0x0, 0x12) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r9, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_FRAME(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="200026bd7000fcdbdf253b0000003c003300a08c09000802110000000802110000015050505050507000020081c111008c188d04996da7d2fcc72e08bd69967c0438152720eadc662c3ccaf44b309fbfa0e6080057009a090000"], 0x60}, 0x1, 0x0, 0x0, 0x14000}, 0x8000) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba7", 0x77}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 362.844978] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) dup2(0xffffffffffffffff, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x40) shutdown(r0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r9, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {0xe94}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_mpls={0x30, 0x0, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x4800}}}}]}]}}]}, 0x68}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r8, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xe4, 0x0, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x19fb1dc672d537d2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4c000}, 0x10) [ 363.019175] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x2d00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:35 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f00000007c0)=[{&(0x7f00000004c0)="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", 0x14c, 0x400}, {&(0x7f0000000000)="00000000000000000000000091b73ef4b8d94485e814962d2ab5c4be6aeaa0d6c47e6c010040", 0x26, 0x8}, {&(0x7f0000010300)="03", 0x1, 0x4}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {&(0x7f0000000140)="1c89395f3afe1096c3ce4e611f153b1c4b6207f28832154ef0e47812ecec8e96c05b09ff955e947f2f28e368ff1e16ab3ca2c8b9302c232bd1929250e2005227bf2203f796f84efbe20368e7aeb0b15d2281a93115f04d23e89ee114ccc4f8dc68e9", 0x62, 0x8}, {&(0x7f0000000380)="c59d1a52b1f9acaf9f5fad95cc1bbf811e9e9cc6ef0ee78da1ba28c0f73f6d62f06e22eded65ee6250c84fc79f6c94137affe450b0d99611c057c1990afd1622df7080f67065b96d2210b9f1e2c9dbb7be5ff3689112d4a4811dcccb5f9faeb43d6a3ae060f761a2688e729b2ca81aa17200996c4e22284f124fc6d2b9d80fa16bb3678a07e7ae5ff7bba18dc0228ae20cee9364c0d3d9ad44794e57fe867ea72f441ca9b93f5eb32c3d899dd9f8af34430ec7baca949dc31bb7ae7e7c411fbcd8fa05392aea3031c5d5", 0xca, 0x3}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000001c0)={0x7fffffff, 0x0, 0x2}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000300)={r1, 0x1}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)=@random={'trusted.', 'trusted.overlay.redirect\x00'}, &(0x7f0000000200)='ext4\x00', 0x5, 0x1) fchown(r0, 0xee00, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r3, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, 0x140e, 0x1, 0x70bd2b, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x24044000}, 0x20044001) [ 363.214208] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf9014", 0x8b}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000001}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x800, 0x70bd25, 0x25dfdbfe}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0xc040) 17:32:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 363.375090] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. [ 363.403416] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 363.459808] EXT4-fs (loop2): VFS: Found ext4 filesystem with unknown checksum algorithm. 17:32:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:36 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0, 0x0, 0x6}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="e4c9cc9fd49277c4f63ded4800"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000004c0)="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", 0x141) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000040)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4, 0x0) gettid() r6 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r6, 0x0, 0x191) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) close(r6) [ 363.639846] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf9014", 0x8b}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 363.709814] EXT4-fs (loop2): Unrecognized mount option "̟Ԓw=H" or missing value [ 363.774552] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 363.792836] EXT4-fs (loop2): Unrecognized mount option "̟Ԓw=H" or missing value 17:32:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4109f7d900000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000003dc0)='nl80211\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r8, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r3, &(0x7f0000003e80)={&(0x7f0000003d80)={0x10, 0x0, 0x0, 0x410800}, 0xc, &(0x7f0000003e40)={&(0x7f0000003e00)={0x28, r4, 0x20, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x6, 0xc}}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x10) r9 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r9, 0x6, 0x15, 0x0, &(0x7f0000000180)) ioctl$PPPIOCSMAXCID(r9, 0x40047451, &(0x7f0000000000)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) sendmsg$TIPC_CMD_ENABLE_BEARER(r12, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x34, 0x0, 0x200, 0x70bd28, 0x25dfdbfe, {{}, {}, {0x18, 0x17, {0x2, 0x40, @l2={'eth', 0x3a, 'batadv0\x00'}}}}, ["", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 17:32:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_DRAIN(r2, 0x4144, 0x0) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fchown(r3, 0xee00, 0x0) [ 363.937473] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 363.995579] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf9014", 0x8b}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) syz_80211_inject_frame(&(0x7f0000000000)=@broadcast, &(0x7f0000000400)=@data_frame={@qos_ht={{{@type01={{0x0, 0x2, 0xf, 0x0, 0x1, 0x0, 0x0, 0x1}, {}, @device_b, @from_mac=@device_b, @broadcast, {0x0, 0x7f}}, {0x4, 0x1, 0x1, 0x0, 0x2}}, {@type01={{0x0, 0x2, 0xf, 0x0, 0x1, 0x0, 0x1, 0x1}, {0x9}, @broadcast, @initial, @random="f2b069f80714", {0x5, 0x1}}, {0x7, 0x1, 0x1, 0x1, 0x2}}}, @ver_80211n={0x0, 0x6f05, 0x0, 0x2, 0x0, 0x3}}, @random="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"}, 0x7a2) [ 364.151055] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 364.171313] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 364.230389] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 364.236042] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 17:32:36 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) fchown(r0, 0xee00, 0x0) 17:32:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07", 0x95}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 364.411794] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 364.442784] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 364.518906] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:37 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, 0x0, &(0x7f0000000180)) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000280)={r4}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r4, 0x3}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000300)={r4, @in6={{0xa, 0x4e23, 0x8, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x12}}, 0x10000}}, 0x80000000, 0x4, 0xa71, 0x8, 0xc4, 0x95, 0x9}, 0x9c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bind$vsock_dgram(r7, &(0x7f0000000040)={0x28, 0x0, 0x2711, @my=0x1}, 0x10) r8 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07", 0x95}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 364.792962] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 364.838484] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:37 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="46c30485eb06a6f64fa3fba4557b6f8f4f0f585cf6b21c65dcc99fcad7bc1460e9e6572b9f2d87885efe19bcf4a4e1c2f0a0ee38e20e6f7ebe671e1adc50695ddc0b40468a85a9"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f0000000600)={@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e21, @loopback}}, {&(0x7f0000000540)=""/90, 0x5a}, &(0x7f00000005c0), 0x28}, 0xa0) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200200, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000480)={0x64, 0x0, &(0x7f0000000300)=[@decrefs={0x40046307, 0x2}, @release={0x40046306, 0x2}, @clear_death={0x400c630f, 0x1}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000140)={@ptr={0x70742a85, 0x1, &(0x7f0000000080)=""/78, 0x4e, 0x1, 0x8}, @flat=@weak_handle={0x77682a85, 0xb, 0x2}, @fd={0x66642a85, 0x0, r9}}, &(0x7f00000001c0)={0x0, 0x28, 0x40}}}], 0xeb, 0x0, &(0x7f0000000380)="515f32d31ac586a98ffa0f34fa050163d8e0984e074f2ab1ff258eae943b30c2c0a59d6ea441ffe701d1e784c36830ad43a3294c5390843807a65c900e5c0a88e58bc7f7c3658c13cbd559540821097aa325c6f272b9ea1f537b54b7bb266ec375c616274d93b5a600c0db475d13f09ce989f4b39f54dadaeb4ee14ff522e38a3dd4d12c30d05a578db598e10dc493a207d12f842ae90081b2709f46a6919703c28c5218e0231f1d704a1aacbec191d23512e8bc52e873a95eccbf54853a661f056c74a86d77e04c7556400b2e5cc992fe02e9a1822f700a9ec4b25346e2e05a05ebcf33cde41c4c78d3e0"}) sendmsg$SEG6_CMD_SETHMAC(r9, &(0x7f0000000880)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000840)={&(0x7f00000008c0)={0x70, 0x0, 0x602, 0x70bd26, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x2}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x7, 0x4, 0x8, 0x10001]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1b6f}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}]}, 0x70}}, 0x4000) [ 365.048569] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07", 0x95}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 365.162045] EXT4-fs (loop2): Unrecognized mount option "FOU{oOX\eɟ׼`W+-^8o~gPi] @F" or missing value 17:32:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x4e, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000003c0)=0x2, 0x4) ioctl$SIOCX25GFACILITIES(r3, 0x89e2, &(0x7f0000000000)) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={0x18, r7, 0x9, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4040000}, 0x10) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) r8 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) read$snddsp(r3, &(0x7f0000000080)=""/40, 0x28) shmat(r8, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) shmctl$SHM_STAT_ANY(r8, 0xf, &(0x7f00000001c0)=""/241) [ 365.280283] EXT4-fs (loop2): Unrecognized mount option "FOU{oOX\eɟ׼`W+-^8o~gPi] @F" or missing value [ 365.304834] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 365.405634] kauditd_printk_skb: 14 callbacks suppressed [ 365.405645] audit: type=1800 audit(1605807157.938:15): pid=30674 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=131076 res=0 17:32:38 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0050c7aab47a615977cffad80085ad269284cb85aed20e188adecac3cf6310d0243c6f4560cb720f4219f5191298ecb2cae02b8a29ea8c6ea51dacdb761a6ea84dc8f621d8e8fe1e9753eeded5f12db7f75077e4b46a098e674ef4c157de6b3b7f6eb048d49fbe56b6c61f3f6cb49e7c6d348fda1dba3685d1693a86e985c9b47c2a31d04d8c056e80d1334d1d87c8149ab117103770bdde29e0d281537197ab2f55c395559e"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 365.478607] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1", 0x9a}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:38 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x404}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0xff}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x3}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="dcf94d2fcb2e675ac5210daaa2ebcf1c8e168c01e5cfd40c2bb6777aeabc82d090db824db9de2de46e6f579d7d6891b057d5d1112cf3442f6327a4ff71b3d6b55b2c52c8ffaeda1e171825b5fddb01dcb19c4b973d5170563adb1c5b9f0b98f1b25a0b0183017bff598e973c8404eec480a0d20cfe472c5929c08243fbcd4cc839f237c07f1ca8ddcdde2eb0a632aa12b093b3667871d021bc323653b3d11326607466a690c829567efcf362e48d2b47f19c18c2cd35658ac19e8bb4114899e9d686194ac212713d58d1a160415d878ec040410b1589dd235dfa"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000002, 0x2010, r2, 0x0) fchown(r0, 0xee00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_DEASSIGN_DEV_IRQ(r5, 0x4040ae75, &(0x7f0000000040)={0xff, 0x0, 0x7, 0x2}) [ 365.593140] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 365.631543] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 365.700861] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 365.798083] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 365.887956] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 17:32:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1", 0x9a}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 365.984477] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:38 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x9) r8 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 366.090573] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 366.139355] audit: type=1800 audit(1605807158.668:16): pid=30674 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="SYSV00000000" dev="hugetlbfs" ino=163845 res=0 17:32:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = inotify_init1(0x0) ioctl$BLKALIGNOFF(r3, 0x127a, &(0x7f0000000040)) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x40000, 0x0) setsockopt$inet6_udp_int(r5, 0x11, 0x1, &(0x7f0000000280)=0x4, 0x4) fcntl$getownex(r4, 0x10, &(0x7f0000000080)={0x0, 0x0}) tgkill(r6, r6, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r6, 0x10, &(0x7f0000000000)={0x10001}) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x1003, 0x4) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x7517184d26dc86f3, 0x0) accept$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 366.213031] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 366.275381] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 17:32:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @initdev}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r3, 0x89f4, &(0x7f0000000080)={'syztnl1\x00', &(0x7f00000002c0)={'ip6gre0\x00', r4, 0x29, 0x5, 0x7, 0xacb3, 0x49, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x700, 0x80, 0x0, 0x8000}}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:38 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x1, &(0x7f00000000c0)=[{&(0x7f00000007c0)="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", 0x1000, 0xffffffffffff7181}], 0x1000, &(0x7f0000000140)={[{@balloc_notest4='block-allocator=notest4'}, {@hash_tea='hash=tea'}, {@noquota='noquota'}, {@errors_ro_remount='errors=ro-remount'}, {@balloc_notest4='block-allocator=notest4'}, {@errors_continue='errors=continue'}], [{@subj_type={'subj_type', 0x3d, 'ext4\x00'}}, {@audit='audit'}]}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 366.352245] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1", 0x9a}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 366.530697] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 366.549869] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r6 = accept(r5, 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:39 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@private, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@private0}}, &(0x7f00000004c0)=0xe8) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x8}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x6}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x3}, {0x0}, {0x0}], 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='pcr=00000000000000000047,defcontext=root,context=staff_u,uid<', @ANYRESDEC=r0, @ANYBLOB="d961756400000100cccf007389bb1bdf175ed45bd3b0abda1294fbb2eb635848c9c27462e33bb5cf"]) r2 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x101800, 0x131) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x3f, 0x9, 0xfffffffd, 0x0, 0x4}, &(0x7f00000000c0)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat(r6, &(0x7f0000000380)='./file0\x00', 0x200080, 0x9) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000001c0)={r3, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x539, @private0={0xfc, 0x0, [], 0x1}, 0x6}, @in6={0xa, 0x4e20, 0x5, @mcast1, 0x200}, @in6={0xa, 0x4e23, 0x52, @loopback, 0x3}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, &(0x7f0000000300)=0x10) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r7) r8 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x200c40, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r10 = openat$cgroup_int(r8, &(0x7f0000000640)='net_cls.classid\x00', 0x2, 0x0) fchown(r10, r9, 0x0) [ 366.759904] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 366.808824] EXT4-fs (loop2): Unrecognized mount option "pcr=00000000000000000047" or missing value 17:32:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f", 0x9c}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 366.958636] EXT4-fs (loop2): Unrecognized mount option "pcr=00000000000000000047" or missing value [ 366.972380] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:39 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200004, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000380)="2e7efd6b845b5c42cecc6e0c6859c8f909c676f6e26800b3000000000000101c770000000000000000009e61a3dede307223310a647cceffdcd2d5dc96ca13c3f9786531d29accc0b9256e91c9300566c22b6482f653618ce78dde00ba7cf8550cac5fa76a3974f25a55d540334869d76772b284a82d1cebd66adb405f67d0f0cca324794ef2e7cff31b89339fdec42aa35ccc5afe0ce48c928771a479070cbb97664e296254cadddecdb7aa759352576f8af54065e99c94925c57dea9", 0xbd, 0x4e0}, {&(0x7f0000010300)="13", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x375c506f}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0987ae8a578c2ee4c77edf05f1b240f36692ef9ca5ffb6ee9e2f8d9b8fa35b94a5a8a9f3cd012ab4deb0968b58d8927e709e838cff260fdc9dd64442a9decfbc95ee96903b598967832aac819ba39214dcdb82d64fdfd3f5d0922c717a164a06cab0e011112c51816ca4aeec4e615486ab34983d28ed69323261ce06ffac00d59f5d2285d04eb9ae627fab915a57c1b3da6c8795a94cbb1e094c2fcea6fb39ea11a0e62f592fd7c1b30d8215ca51eea7a47ff3ad45c72e2ae7e8f5af20b356a58d282a546247276508243b7ad62d021aa80d3311b6d47275cbb384"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) accept4$ax25(r5, &(0x7f0000000300)={{}, [@null, @remote, @netrom, @default, @remote, @default, @default, @netrom]}, &(0x7f0000000540)=0x48, 0x800) r8 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x800, 0x4401) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x141200, 0x0) ioctl$VIDIOC_QBUF(r5, 0xc058560f, &(0x7f0000000180)={0x4, 0x4, 0x4, 0x2000, 0x3, {r6, r7/1000+10000}, {0x4, 0x0, 0x8, 0x7f, 0xeb, 0x4, "b7b8c88d"}, 0x984, 0x1, @fd=r8, 0x80000000, 0x0, r9}) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000040)={0xb71, 0x0, {0xffffffffffffffff}, {0xffffffffffffffff}, 0x8001, 0x81}) r11 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/consoles\x00', 0x0, 0x0) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000600)='nl80211\x00') sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r11, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x14, r12, 0x200, 0x70bd29, 0x25dfdbfe, {{}, {@void, @void}}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20044000}, 0x1) fchown(r0, r10, 0x0) 17:32:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 367.159473] EXT4-fs (loop2): Unrecognized mount option " W.~@f/[*ްXؒ~p&ܝDBϼ;Yg*ۂOВ" or missing value [ 367.239978] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r6 = accept(r5, 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f", 0x9c}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 367.410288] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 367.615900] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f", 0x9c}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r6 = accept(r5, 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) [ 367.791840] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 367.969275] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 368.159283] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d", 0x9d}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r6 = accept(r5, 0x0, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) 17:32:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 368.353421] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 368.462628] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffff000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d", 0x9d}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r5, 0x0, &(0x7f0000000000)) [ 368.655630] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffff1f0000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:41 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d9b6ab003b803aff7f818606000000003642", 0x15, 0x30000}, {0x0, 0x0, 0x10000000000}, {0x0}], 0x200800, &(0x7f0000014a00)=ANY=[@ANYBLOB]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = getgid() setresgid(0xee01, r2, 0xee00) r3 = getgid() setresgid(0xee01, r3, 0xee00) getgroups(0x8, &(0x7f00000000c0)=[0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff, 0x0, 0xee01]) r5 = getgid() setresgid(0xee01, r5, 0xee00) r6 = getgid() setresgid(0xee01, r6, 0xee00) r7 = getgid() setresgid(0xee01, r7, 0xee00) r8 = getgid() setresgid(0xee01, r8, 0xee00) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000140)={{}, {0x1, 0x5}, [{0x2, 0x5, 0xee00}, {0x2, 0x6, 0xee01}], {0x4, 0x3}, [{0x8, 0x0, r2}, {0x8, 0x6}, {0x8, 0x7, r3}, {0x8, 0x0, r4}, {0x8, 0x1, r5}, {0x8, 0x3, r6}, {0x8, 0x4, r7}, {0x8, 0x4, 0xee01}, {0x8, 0x1, r8}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2) r9 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 368.832587] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 368.985321] EXT4-fs warning (device loop2): ext4_enable_quotas:5878: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 369.034548] EXT4-fs (loop2): mount failed [ 369.048070] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:41 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000300)=""/246, 0xf6) fchown(r0, 0xee00, 0x0) 17:32:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:41 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31abd970d337e2d5afde56e871df2ab2cbab0fca", 0x4d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d", 0x9d}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) accept(r5, 0x0, &(0x7f0000000000)) 17:32:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) accept(r5, 0x0, &(0x7f0000000000)) [ 369.237609] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) [ 369.268037] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 369.335742] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:42 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[@ANYBLOB='\x00']) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) sendmsg$AUDIT_GET(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3e8, 0xa62e8f83e3a466b7, 0x70bd27, 0x25dfdbff, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x20004000}, 0x8080) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) accept(r5, 0x0, &(0x7f0000000000)) [ 369.543620] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) [ 369.584618] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 17:32:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 369.798552] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) [ 369.994390] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:42 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x1, 0x8, 0x1, 0x6}, {0x3, 0x48, 0x0, 0x5}, {0xffff, 0x3f, 0x1, 0x5}]}) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000007c0)={'filter\x00', 0x7, 0x4, 0x3f0, 0x110, 0x110, 0x220, 0x308, 0x308, 0x308, 0x4, &(0x7f0000000080), {[{{@arp={@broadcast, @multicast2, 0x0, 0x0, 0xb, 0x7, {@empty, {[0xff, 0x0, 0xff, 0x0, 0xff]}}, {@mac=@multicast, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}}, 0x4b, 0x5, 0x0, 0x4, 0x5, 0x8, 'gre0\x00', 'gretap0\x00', {0xff}, {}, 0x0, 0x20}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev={[], 0x39}, @empty, @multicast1, @remote, 0xf, 0x1}}}, {{@arp={@remote, @rand_addr=0x64010101, 0xff, 0xff, 0x9, 0x8, {@mac=@remote, {[0x0, 0xff, 0x0, 0x0, 0x0, 0xff]}}, {@empty, {[0xff, 0x0, 0x0, 0x0, 0xff, 0xff]}}, 0x3, 0x20, 0x200, 0x9, 0x9, 0xfffb, 'ip6_vti0\x00', 'lo\x00', {0xff}, {0xff}, 0x0, 0x88}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @multicast1, @private=0xa010102, 0x2}}}, {{@arp={@empty, @private=0xa010101, 0xffffff00, 0x0, 0x4, 0x7, {@mac=@remote, {[0xff, 0x0, 0xff, 0xff, 0xff]}}, {@empty, {[0x0, 0x0, 0xff, 0xff, 0x0, 0xff]}}, 0x7, 0x8, 0xffff, 0x0, 0x9, 0x8000, 'geneve0\x00', 'veth0_virt_wifi\x00', {0xff}, {}, 0x0, 0x1a2}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0x220}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r5, 0x0, &(0x7f0000000000)) [ 370.090713] EXT4-fs (loop5): fragment/cluster size (65536) != block size (4096) 17:32:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r5, 0x0, &(0x7f0000000000)) [ 370.213427] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r5, 0x0, &(0x7f0000000000)) 17:32:42 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x200000, 0x9, &(0x7f0000000080)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc05e01000000803a62ae0ab99a946a14000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 370.339749] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r5, 0x0, &(0x7f0000000000)) [ 370.402829] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 370.516161] EXT4-fs warning (device loop2): ext4_enable_quotas:5878: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:32:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r5, 0x0, &(0x7f0000000000)) [ 370.581323] EXT4-fs (loop2): mount failed [ 370.657523] EXT4-fs (loop5): Can't read superblock on 2nd try [ 370.689115] EXT4-fs warning (device loop2): ext4_enable_quotas:5878: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. 17:32:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r5, 0x0, &(0x7f0000000000)) [ 370.746784] EXT4-fs (loop5): Can't read superblock on 2nd try [ 370.758808] EXT4-fs (loop2): mount failed 17:32:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:43 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x7}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0xffffffffffffffb7, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00455b522d9d956868d730752658deb35dcd8aa389c3ccd779907c4095564ef6cdf5008dd1b378c37a513bd74351fc7cf450996d9ece66815cee2424c3f37af7dd60432a48460e764dee92a1709835d2d759451dff5db11c6850b7cec901de86f352cf720d77d1ee4e8020db27311dae6c2adbbe404f6c864e2a372e44771f5b89c803e7968878631c49b828f7ec5d42debbfaba240fee2e765e48560649bcc1650bdcc4c04a614a510a0281c18ab3840d906cd8"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$vim2m_VIDIOC_G_FMT(r3, 0xc0d05604, &(0x7f0000000300)={0x3, @sliced={0x0, [0xed, 0x2df, 0x95c, 0x5, 0x14e, 0x1, 0x1, 0x2, 0x7, 0x23a, 0x400, 0x1ff, 0x7, 0x101, 0x1ff, 0x8, 0x8000, 0x400, 0x9, 0x2, 0x3, 0xa721, 0x7fff, 0x1, 0x9, 0x1, 0xbb, 0xbc00, 0x101, 0x9, 0xf82, 0x7ff, 0xffff, 0x7, 0x23, 0x1, 0x5, 0x7, 0x3, 0x0, 0xf800, 0x1000, 0x4, 0x7, 0x4, 0x100, 0x401, 0x1000], 0x1}}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x200000, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r5, 0x400448c9, &(0x7f0000000180)={@any, 0x9da8}) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 370.940340] EXT4-fs (loop5): Can't read superblock on 2nd try [ 371.021247] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:32:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 371.190165] EXT4-fs (loop5): Can't read superblock on 2nd try [ 371.273206] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {0x0}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 371.355622] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 17:32:44 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 371.422819] EXT4-fs (loop5): Can't read superblock on 2nd try [ 371.509165] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:44 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0068981091ae16673e125a50c8916d2521cac8774cbaaacf6f19024d32ea2ac8422bc99838a182c4fc067b4c8e597b6f057ba233567cf4a4e55bf2091dfbf678edf1facf8e36d435d76cf3ba41c2a3e7aa17222dd994481897bef95225bd46e52eb5676229ad8365ca514397a164177b9da08325c50801003bf2ec6702aa65ee2a"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 371.680536] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:44 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) fcntl$getown(r0, 0x9) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 371.749976] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {0x0}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 371.878001] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 371.939008] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:44 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:32:44 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000b1cd4d49cbda526b957eb2354d6d6b5dc2c645e16"], 0xd, 0x2) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_S_AUDIO(r8, 0x40345622, &(0x7f0000000300)={0xffff60d8, "f800675fa07e226ef64571320f632da4af108417c001ea46d7bd1ad11cd6fa2b", 0x1}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r5, &(0x7f0000000040)="bf552d35bdbd71a9c5f8b51fca8f54e79940c2357d668ba07d69ea8d9ec525f0e2b96bf8a3facd33c5b37d91924f4160c5bd3fb620e253c0a46270c09ca442abcc7cf1030ec19cea948e6b098e2cd82f8c81ce50887a25b114737f647a4a136fff2b22d638863bb00c2d78deb213e0d5cffe945bb0bd0341d5b4c7c7b043d435eb1b01a3aa10d9dcd893570827db260d4a6b86f0e75bff6e33e622f927ff1bf493e1bfbd709627dae469151a07bd38"}, 0x20) fchown(r0, 0xee00, 0x0) 17:32:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 372.054985] EXT4-fs (loop5): Can't read superblock on 2nd try [ 372.247663] EXT4-fs (loop5): Can't read superblock on 2nd try [ 372.294653] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {0x0}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 372.363038] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:45 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="085560448c439961f8233ab2c5450022e739c10d3ce471074a57b7"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x80, 0x50b482) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0x7b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000007c0)={"520e1a843f4b6de8cf7ce5df14eea3a1", 0x0, 0x0, {0x3a, 0x1f}, {0x20, 0x4}, 0xed, [0xff, 0x44c8, 0x0, 0xff, 0x80000000, 0x2, 0x6, 0x5, 0x7b38, 0x8, 0xfffffffffffffc98, 0x0, 0x0, 0xc0, 0x2, 0x80000001]}) ioctl$BTRFS_IOC_WAIT_SYNC(r2, 0x40089416, &(0x7f0000000080)=r6) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @loopback}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000400)=0xe8) getgroups(0x2, &(0x7f00000000c0)=[0xee01, 0xee00]) r9 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) fstat(r9, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r10) write$P9_RSTATu(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r10], 0x5a) r11 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:45 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r3, 0x0, &(0x7f0000000000)) [ 372.566888] EXT4-fs (loop5): Can't read superblock on 2nd try [ 372.566989] EXT4-fs (loop2): Unrecognized mount option "U`DCa#:E" or missing value [ 372.631160] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 372.724201] EXT4-fs (loop2): Unrecognized mount option "U`DCa#:E" or missing value 17:32:45 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[@ANYBLOB='\x00']) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$bt_hidp(0x1f, 0x3, 0x6) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f00000000c0), 0x4) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000340)) fchown(r0, 0xee00, 0x0) r5 = inotify_init1(0x0) fcntl$setown(r5, 0x8, 0xffffffffffffffff) fcntl$getownex(r5, 0x10, &(0x7f0000000080)={0x0, 0x0}) tgkill(r6, r6, 0x0) move_pages(r6, 0x2, &(0x7f0000000040)=[&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil], 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) [ 372.879809] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:45 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r3, 0x0, &(0x7f0000000000)) [ 372.981904] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x16, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 373.058335] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 373.189137] EXT4-fs (loop5): Can't read superblock on 2nd try [ 373.276332] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x41, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:46 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 373.478661] EXT4-fs (loop5): Can't read superblock on 2nd try [ 373.561421] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x63, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:46 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r3, 0x0, &(0x7f0000000000)) [ 373.649142] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000500)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="0000dd67536d0de00000", @ANYRES16=0x0, @ANYBLOB="00022dbd7000fbdbdf256300000008000300", @ANYRES32=r3, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x10000884}, 0x1) r5 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) sendto$x25(r5, &(0x7f0000000040)="58604455fe54461c7589c00c04ea3af440a69fd899810b7c362b1bf9a16cb95850eaef1561cb1154bb08f6721ad89dd6faacdd68c10a3eee555d1f7fdca1b7714c9b72ebc1d13a8c354ee0afc48b34531e09ec8626bc354a7f", 0x59, 0xd12e8ee4c8d5b26, 0x0, 0x0) r6 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = dup(r7) socketpair(0x11, 0x80000, 0x1f, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r9, 0x400443c9, &(0x7f0000000300)={@fixed={[], 0x10}, 0xa3d}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) fchown(r6, 0xee00, 0x0) [ 373.764342] EXT4-fs (loop5): Can't read superblock on 2nd try [ 373.847971] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 373.999760] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 374.097846] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3ad, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 374.202868] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:46 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r1, 0x0, &(0x7f0000000000)) [ 374.359792] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:47 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="db31e2b64a8dd22a7c5c065bc698ab7012d09b565cd15b66ccb7e727acee29eafcc7b936275bca0fd09e14eee971a6d14765c64ebb6ce06d5c6246aefab8f2aa3b3ec03cfee6df785c5dde7ed9fba39e0553af0e30c901ca987224c756522140aa9e12ee8684704d1886"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_REWIND(r3, 0x40084146, &(0x7f00000001c0)=0x1a54) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) syz_mount_image$qnx4(&(0x7f0000000040)='qnx4\x00', &(0x7f0000000080)='./file0\x00', 0x40, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000300)="aee424ab535f53cf214e61c388820ca4445f85d264e7255b2c85936aa15074cb0b9247e19d71378d577073470327337477760be57b109bb9c60ce790065f2810ad94f43dd66b890b41bcf72880882448c670d06e8a6ae7bcc5336a7b3396e99287cec1a53b80a615f4aab4024543ed3dcbc3166994685874b8ec75ff1b3649b3349795eb21d4761cef2d63c17835aaa0807743e954c832e99882fb6e8d9a611c9d3b9d9945a234ae99ec2aa766ba243175ccf1e756e5fc152111b52204c10d8643", 0xc1, 0x8}, {&(0x7f0000000400)="40b5f24700b08d3a2ec28067615b796d4da88a09da3374cde305f1d9f71d5a8be396427eeeb9f0448a5eb132a171be2f0fc47247c0ba118f18b3d0dd56a956610a1f249866f7cc806ae6314f83e22687d1ca69e46db2765085ef1ec7cfbe9171cba5d72ea27fbd40edec9ae1811b13afb2bf78bbcc430cf10af24b36fe82d7a3ee9703e3609f26b40c4d9f7a888351743e092a3eac0ca92b3b65926fe3ad9147c4e54a8b8e8aea708aab0b7c682dc2c54891b550b2bf8320cde891443af95734277d08139fb836ed9b7d28d1f96def35ba4cdad903eb569a91cf0b0116ae256dde1060a6ea181de4", 0xe8, 0x44e}], 0x221000, &(0x7f0000000140)={[{'ext4\x00'}, {'ext4\x00'}, {'security.ima\x00'}, {'@'}, {'security.ima\x00'}, {'security.ima\x00'}, {',#'}, {'-'}], [{@subj_user={'subj_user', 0x3d, 'ext4\x00'}}, {@uid_lt={'uid<', 0xee01}}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$NFT_MSG_GETGEN(r8, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x14, 0x10, 0xa, 0x1b8326e270bdaaae, 0x0, 0x0, {0x2, 0x0, 0x4}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x50}, 0x20000000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d0510", 0x27}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 374.479246] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 374.565972] EXT4-fs (loop2): Unrecognized mount option "1J*|\[ƘpЛV\[f̷')ǹ6'[ОqGeNlm\bF;>0x0}) tgkill(r5, r5, 0x0) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000040)=r5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 375.065677] EXT4-fs (loop5): Can't read superblock on 2nd try [ 375.102554] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d0510", 0x27}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 375.166138] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x43e, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:47 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) open$dir(&(0x7f0000000040)='./file0\x00', 0x240000, 0x1b3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:47 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$sock(r1, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r1, 0x0, &(0x7f0000000000)) [ 375.358619] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 375.414987] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:48 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x204000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4801}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_SET_LEDBIT(r5, 0x40045569, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000180)=@int=0x4, 0x4) fchown(r0, 0xee00, 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x9, &(0x7f0000000140)='\x00') [ 375.480019] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x43f, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d0510", 0x27}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 375.681219] EXT4-fs error (device loop2): __ext4_iget:5080: inode #3: block 32705024: comm syz-executor.2: invalid block [ 375.732172] EXT4-fs (loop5): Can't read superblock on 2nd try [ 375.741823] EXT4-fs error (device loop2): ext4_quota_enable:5841: comm syz-executor.2: Bad quota inode # 3 17:32:48 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r2, 0x0, &(0x7f0000000000)) [ 375.794015] EXT4-fs warning (device loop2): ext4_enable_quotas:5878: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 375.828697] EXT4-fs (loop5): Can't read superblock on 2nd try [ 375.879097] EXT4-fs (loop2): mount failed 17:32:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x440, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 375.980416] EXT4-fs error (device loop2): __ext4_iget:5080: inode #3: block 32705024: comm syz-executor.2: invalid block [ 376.018994] EXT4-fs error (device loop2): ext4_quota_enable:5841: comm syz-executor.2: Bad quota inode # 3 [ 376.064771] EXT4-fs (loop5): Can't read superblock on 2nd try [ 376.082363] EXT4-fs warning (device loop2): ext4_enable_quotas:5878: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 376.110509] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x441, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c76bc1a22d06b8499f31", 0x3a}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 376.156360] EXT4-fs (loop2): mount failed 17:32:48 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000140)=""/178) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000040)=0x6) 17:32:48 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r2, 0x0, &(0x7f0000000000)) [ 376.287003] EXT4-fs (loop5): Can't read superblock on 2nd try [ 376.387714] EXT4-fs (loop5): Can't read superblock on 2nd try [ 376.396019] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x442, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:49 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000340)=ANY=[@ANYRESDEC=0x0]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000380)='security.ima\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="eaffffffffffffffa7f0a9386438ecdbdb41badaec682f5d2488c746b1393e6ddd7323c28d3170b4e7f73318"], 0x8, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000001c0)=0xffff, 0x4) r2 = openat(r0, &(0x7f0000000300)='./file1\x00', 0x10700, 0x68) ioctl$SNDRV_PCM_IOCTL_PREPARE(r2, 0x4140, 0x0) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r7, 0x0, 0x0, 0x0) fchown(r7, 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) [ 376.576552] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d0510", 0x27}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 376.669011] EXT4-fs (loop5): Can't read superblock on 2nd try [ 376.696807] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 17:32:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x443, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:49 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r2, 0x0, &(0x7f0000000000)) 17:32:49 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[@ANYBLOB='\x00']) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) r3 = accept4(r1, 0x0, &(0x7f0000000040), 0x80800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r5) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x40010, r5, 0xa319000) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r6, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r6, 0x84, 0x6f, 0x0, &(0x7f0000000180)) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000280)={r8}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={r8, 0x3}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000080)={r8, 0xd6c4, 0x53}, 0x8) [ 376.948172] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x444, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 377.026935] EXT4-fs (loop5): Can't read superblock on 2nd try [ 377.125775] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d0510", 0x27}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 377.181898] EXT4-fs (loop5): Can't read superblock on 2nd try [ 377.223933] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:49 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setsockopt$XDP_TX_RING(0xffffffffffffffff, 0x11b, 0x3, &(0x7f0000000040)=0x200000, 0x4) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x445, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 377.383215] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:50 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x2800, 0x0) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 377.455683] EXT4-fs (loop5): Can't read superblock on 2nd try [ 377.597505] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 377.627352] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d0510", 0x27}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x446, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 377.876480] EXT4-fs (loop5): Can't read superblock on 2nd try [ 377.958379] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x447, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c7", 0x31}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 378.122102] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:32:50 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0020ca31ae7cd4899741f19bd1588a0f32e6f653f337e927b1a52df81c4552aa5862af38101dcecd33e6714aaa529d999aa220d8e75d6470ff7392a6d49d4d81c22513082700227a534714892995ee7da3b38aa8b90c8da80fa4049ac4322fd302"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r1, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000340)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000140)="b07d4a6c04dfc7a8d018e364f28be3c6a5c7c6efe7862072d43c348f5d8d635f3733ea40b06f03841f2755a156b08cac967857ad4055041231431c311ba0355651d0f231790ba4fd7beec38bc06724ca95a6", 0x52}, {&(0x7f00000009c0)="de32fc3ba41b81c0595dfe188d9f17f5faf48bd270b7f76b814f20ff2c1654438e101b4e175ce28880bda81e2f5b3f208b5b480316455f44a73c14b39357ac594160f14869ac307927e526aa27f16c2d14bd", 0x52}, {&(0x7f00000001c0)="f987f1c081e10aef65e5359a56c4f720747ab2d290afb7fe117140230679cfeea8a70e995b2c31f55fc511f5c2d3e247f28e6a6eaefa49cf7705", 0x3a}, {&(0x7f0000000380)="6294a44ad75847ef4a6f9512b7d08771d6101cbb618553ff0c5b7ffe9277d91ed7fb857c7df5e81eb03bff0e51bf9cd37275905b5badd0894b250386c9a23a5c530b4c6c95573b152df6ea4876227d6eb0f4220acaeb90c63a81f2487aa9e3639d2f0f4a3ee427fb7ccf5bfa6cae27d799f80cb11d79b1bba72e49335fbbe426a86c1ac0a8fb44f79e46b969530260bf2fc23b0ad58dc46a8b8d08f304cd7e70d192f8c7cd1184adcf0a707dd93dc130db7f231b1ca37c501efff4b5ab8cbfe633f817", 0xc3}, {&(0x7f0000000480)="c458d7b24e3edee745770dbbc3503da68746ce62a26196b91e180eef06f7279b3979fbdeb5c37bff885244d186f21dd55341e04979834a95019acc86cf15f46539", 0x41}, {&(0x7f0000000500)="531265ee67b4113c0fbf5f31226351fd4202defad88fbc289132c9f2413d2e455a8a4daf39b489d4d44f3b6dab50c5cdda2e318c0d1877fb75df6e978be1136eae1a00ab377c8ccf17f6a2957d96e882222615d8e7ed165e9c1cc92a7d960a1e403a8e8110c4fe85abd1f1d97a7aabf91ac8fe4b76cfa8b1", 0x78}, {&(0x7f0000000a40)="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", 0x168}, {&(0x7f0000000640)="273778519c87dd9d0be49b83f0f42c57cbcb70b5b384787c7c5dd4c9d782ba2d9f40274fe1fbbeee0349dc45852ae2e5b4ed536f99103119ef4eea85c8057d94daf79c4abefe321afda11c2a89f1891cd3b1687f19bf830228c6d9f82bb5ab076b879a", 0x63}], 0x8, &(0x7f0000000840), 0x0, 0x20004000}, 0x4000841) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 378.213002] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x448, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036", 0x28}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 378.363541] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 378.376870] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r3, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r4, 0x10, 0x3, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x54}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x48001) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) statx(r6, &(0x7f0000000040)='./file0\x00', 0x1000, 0x7ff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, 0xee00, r7) [ 378.470910] EXT4-fs (loop5): Can't read superblock on 2nd try 17:32:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x26b9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 378.656836] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:51 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:32:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036", 0x28}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 379.006814] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:32:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(r2, 0xab09, 0xffffffff) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x26c8, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036", 0x28}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r2, 0x0, &(0x7f0000000000)) [ 379.261269] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:51 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1001}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 379.466688] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 379.536888] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 450971566592)! 17:32:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5400, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 379.617381] EXT4-fs (loop2): group descriptors corrupted! 17:32:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50", 0x2d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 379.713090] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 450971566592)! 17:32:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r2, 0x0, &(0x7f0000000000)) [ 379.753828] EXT4-fs (loop2): group descriptors corrupted! 17:32:52 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000040)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x430000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[@ANYBLOB='\x00']) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 379.965532] EXT4-fs warning (device loop2): ext4_enable_quotas:5878: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 380.038799] EXT4-fs (loop2): mount failed 17:32:52 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f00000007c0)={0x1b4, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x60, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_MEDIA={0x74, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x68}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x20}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}]}, @TIPC_NLA_PUBL={0x4}, @TIPC_NLA_NET={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6598}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xc92}]}, @TIPC_NLA_NODE={0x6c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x12, 0x3, "1c51346c9902325e4417222fd66f"}, @TIPC_NLA_NODE_KEY={0x3d, 0x4, {'gcm(aes)\x00', 0x15, "9ba03f7e262eb54e5c22700a8957677713829d4fbf"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x4044}, 0x4800) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50", 0x2d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r2, 0x0, &(0x7f0000000000)) [ 380.197170] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 380.219070] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9f00, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="077274123bcb0a6c0433e60575a3b291149133751f8f761de8b702492a508df980a82618afe7002b71402276441a4cd1837fbb4191a45addf468450000000000000000000000000000fef3959755040504242e955fe81ff400e58e9d7027af76d9e1c855af20a2a3263be23d566a7896a29f1da1cf407dc04b9c213cb60dde0a405a9a456472884104ee2ff429078502dfa98826e59349bce28c42fb1924be1ebf4cc8a8d22c24759e409a8cdd290c59fea0cf384bb142420d9da36c7e9d9c2b1e98b0310d841eb7cde03c35d6d7abcc78d7def0872b6feb1fa127b583ad66d5375db05a06fad9b8c25e247f52ed6e9e46f48d"]) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) accept4(r2, 0x0, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0edb00390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1a0d", 0x66}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8983, &(0x7f00000000c0)={0x7, 'macvlan0\x00', {}, 0xfff9}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r6, 0x40045569, 0x7) socket$inet6_tcp(0xa, 0x1, 0x0) fchown(r0, 0xee00, 0x0) write$P9_RWRITE(r5, &(0x7f0000000040)={0xb, 0x77, 0x2, 0xffffffff}, 0xb) [ 380.510052] EXT4-fs (loop2): Unrecognized mount option "rt; [ 380.510052] l3u3uvI*P&" or missing value 17:32:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r3, 0x0, &(0x7f0000000000)) 17:32:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50", 0x2d}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 380.634132] EXT4-fs (loop2): Unrecognized mount option "rt; [ 380.634132] l3u3uvI*P&" or missing value 17:32:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x3516}, {&(0x7f00000000c0)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000040)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180004d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[@ANYBLOB="fa"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040), &(0x7f0000000080)) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) fchown(r0, 0xee00, 0x0) [ 380.893817] EXT4-fs (loop2): Unrecognized mount option "" or missing value [ 380.993900] EXT4-fs (loop2): Unrecognized mount option "" or missing value 17:32:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e", 0x2f}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[@ANYBLOB='\"']) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r3, 0x0, &(0x7f0000000000)) [ 381.221870] EXT4-fs (loop2): Unrecognized mount option """ or missing value 17:32:53 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="595188f20ed51aa4cde2cb8208ad598682b89a04c7e7266f19c6b0c5cfd18040dc74d2c4019b860018c6db88ec5f02b2639e5e6dfc6ebec41100e2e7e3f2efcdcb82c0784b0447f4350d56883256311e79c16f8d490a9171a8bfbdd15a813b69bcf17a80745e49e40ba1cf2daeda6990acdcd448b502b11035f98182b19f677716b6765a9f8fa7169690ece4250d9b448461215d00ad9cfe55a291"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x10000, 0x2, 0x3000, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) ioctl$PPPIOCSNPMODE(r3, 0x4008744b, &(0x7f0000000340)={0x2d}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) lsetxattr$trusted_overlay_redirect(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) 17:32:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xd700, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 381.409283] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 381.522725] EXT4-fs (loop2): Unrecognized mount option "YQ˂Y&oưр@t" or missing value 17:32:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e", 0x2f}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 381.619980] EXT4-fs (loop2): Unrecognized mount option "YQ˂Y&oưр@t" or missing value 17:32:54 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x801, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000080)={0x2, [0x2, 0x33]}, 0x8) 17:32:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r3, 0x0, &(0x7f0000000000)) [ 381.792244] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:54 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00ff00e1b827e0c919fea9f6b9a45985d41433bc4700afea2dc19d6af752bd46eafccb88529808a67a1294f55a704ef60ee1d9145c28c42d0617ae4e8351eb90bd6bab946b4cd4df8415c6b39084a65ee405fd28604ff4708c1d2690a6b0387caf69e8"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$nfc_llcp(r4, &(0x7f0000000040)={0x27, 0x1, 0x0, 0x7, 0x0, 0x1, "7862e3e1704b8313f15fb7cf040811ddb1694bb79c9c2ee45125046fa7a07ef23626171c32967ae6388afe3f60266b31329347cea0bdd87d7578d6a4d744d1", 0x19}, 0x60) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 382.009788] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e", 0x2f}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:54 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="f294939c458900"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$RTC_UIE_OFF(r5, 0x7004) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x24082, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) perf_event_open(&(0x7f0000000500)={0x6, 0x70, 0x8, 0x4, 0x3f, 0x6, 0x0, 0xbe2, 0x408, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000004c0), 0x4}, 0x810, 0x2, 0xfffff695, 0x0, 0x9, 0x3}, 0xffffffffffffffff, 0xe, r9, 0x1a) io_cancel(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x4ca, r3, &(0x7f00000003c0)="4ac9b8f0defb845064c145aa7bb1966328bde4d142bd", 0x16, 0x8, 0x0, 0x1, r6}, &(0x7f0000000480)) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(r5, 0x40096100, &(0x7f0000000380)={{&(0x7f0000000300)={'GENERAL\x00', {&(0x7f0000000140)=@adf_str={@format={'Cy', '2', 'NumConcurrentRequests\x00'}, {"8aa6778aba0a1d6a41816c12c7e4fc6b7647f785b47bacb695d4189c1ca7d489cb04315ea5e0952aaf64278588fc588ff80ad9d0509f5850120ad4494fe06db0"}, {&(0x7f0000000040)=@adf_str={@normal='NumberCyInstances\x00', {"9acc2017e667bef2455a42333057c212661e7aa4f7daea94086db1374bb8e90e107798bc113100f74c9fecb73f860024256590cd98219db0c8244c69b5e00326"}}}}}}}, 0x81}) fchown(r0, 0x0, 0xffffffffffffffff) 17:32:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r3, 0x0, &(0x7f0000000000)) [ 382.282896] EXT4-fs (loop2): Unrecognized mount option "򔓜E" or missing value [ 382.348483] EXT4-fs (loop2): Unrecognized mount option "򔓜E" or missing value 17:32:55 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = signalfd(r1, &(0x7f0000000040)={[0x20]}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) io_destroy(0x0) accept4$packet(r3, &(0x7f0000000140), &(0x7f0000000180)=0x14, 0x800) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 17:32:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x72e07d19, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 382.522368] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:55 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000000300)="1172eb2f55ed3e3f8a4012e50c6ef2e3d7571aea89ab893870ec59ee64bff1f6deb9f05a93d735746001baa60e169e275314d533986dc2a807249685f42345c7c2120ec1ba9e95f1bb0fe01e02d12df9846d54ce7d177bcbd2c22c163231983fcf7e000000000000000000000000000000000000005bcdbae2a86ee24b953d84e22cbc8096ac8b6d6580a9edab89c683d42c12c83c43c43bf202293223a41935a5365a0701d28d5c45f1b291d15c66e20dcd1cc1312a97daef8cffa4b99eeb2b08951ff8f6850daceb312dd54e411ed4a1c49b9076e2680143c87721d9ea75e1aaa85e", 0xe3, 0x640}, {&(0x7f0000000080)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000400)="ed41000000100000d4f4655f0000000000000400801623017d6853bf726c417c8e77fd27697e1f000000c83a03357427dbfb8ba4f927f07dbcebe072b23be42384ef3e4cbb45523ebfd7a187dbe75b531727c9f39b61c2aba249480fd00bc522030788bffb36d41e7797727d4a5a847c37c54723964eb196b4e643d7898082081c59978e00000000000000007e6c92ad26af83a9e7ea5caeaa734991", 0x9c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0, 0x0, 0x8}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00cb4e2c091e6d20c9f546841cfbe3e5459c7610"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') fchown(r0, 0xee00, 0x0) 17:32:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96", 0x30}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 382.688438] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: bad extra_isize 22812 (inode size 1024) [ 382.758833] EXT4-fs (loop2): get root inode failed [ 382.784330] EXT4-fs (loop2): mount failed 17:32:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r3, 0x0, &(0x7f0000000000)) [ 382.848488] EXT4-fs error (device loop2): ext4_fill_super:4448: inode #2: comm syz-executor.2: iget: bad extra_isize 22812 (inode size 1024) [ 382.912045] EXT4-fs (loop2): get root inode failed [ 382.933904] EXT4-fs (loop2): mount failed 17:32:55 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x1000000000000400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901440000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000080)=@sha1={0x1, "1a1c674389535c39f500b76fe55d3addcd7a2b40"}, 0x15, 0x2) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96", 0x30}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 383.131133] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 17:32:55 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) [ 383.317518] EXT4-fs (loop2): Unrecognized mount option "zQyadKdvPRc?9ڶX^1 Zn Py^Sv} [ 383.317518] jYyryP v YF-U-5-ڿ挛" or missing value 17:32:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r3, 0x0, &(0x7f0000000000)) 17:32:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x72e07d1f, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 383.509341] EXT4-fs (loop2): Unrecognized mount option "zQyadKdvPRc?9ڶX^1 Zn Py^Sv} [ 383.509341] jYyryP v YF-U-5-ڿ挛" or missing value 17:32:56 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg(r2, &(0x7f0000000b40)={&(0x7f0000000680)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'blake2b-256-generic\x00'}, 0x80, &(0x7f0000000ac0)=[{&(0x7f00000007c0)="e1a445813bd6a074cc39fd58b69cc673ddfb0c78fbc41ff5aaef7e7a53a8f4b2653db9b389c9a029e9906ceeb8fb43d85a89a74dcebd51569839dd56394105b8c504058908cfcf3bfbf22a695465c1393182e057014c7fa1b227e2b01fe044de47d61729edcccadd9eaec55fec2752cc598af3416eedf86f3b85f34f883bab9e4279d1055caa47e2a3b9dc688d9dedb461bea6cf11cd17d0eb48d57246074d68b249f25f9c2b129fa5379a75e91f68e9be3658e9143ba3fc8160deeb0e81296801492f52328004e6c5cb7aa07c86c5b3ab989ffc76cb1f033c30a302879626e4dac0c5a319b5e33b52eda5a79520003b064d4ffcc3268bc116afa5b7b105", 0xfe}, {&(0x7f00000008c0)="7ff6802fda34b1ddf1", 0x9}, {&(0x7f0000001000)="21fa6ab9fbbfda4fbf436b1292836e9d5ad1f4947c115334368b206d4c810368209a5e9258113bcedb66bc636dfd8a3f45446bdf5c2ad6818f00fdda95d0c272cd8b882c4190626ab6d9c1e4b43c9314826c2d0122b15ea92b29b84b5f25b1a65be2bb6437e55c9e04818a4c372e990df58c68ed1d4fe0996846cf4f36f44636a2792ae8d3686d5ea09d59b42a92f215b8de2b0ef6367c153f1b1bda791f4bf60ebe8262f8a313edd5907b50ac6eed501ed46212340743159d336225cda6d57888c47c0ebfcf1e1fd90c806194dcaad28e40b84c44495911c9e5ee4a39dbae5a69f11424245bec2237b141c418571ee199bd1f36811d621eb21da24045a64a2a512c7a1842d6fd68ce62cd5fd08e3cf7b8cadd1ce93bdb4249f1e0a367405732e27174953fc808c8c803cb0469ace2c2724e822bd76ccd4b6961be08cf249a366e44e3bf57720cffeb30880f5cc453998fcc6c2c72c2cb380a2ba6fae10df22fdaf649290d9bac23c920d4a8c9d979599b0d47f81dea6e253f2e6a1ab826e79551cde7f1956a1e9deabfde082c8c2e873c5a3e2eed5c713d2ddc994bdf93e657d7f110adee4e38c995e0cd42bc2a3f2c3bed06597a2291dfb8b22e29150c5b14a2eb2eed067675300d0d6fe8191c2f10232707f5e0c52bc867bcaf393dfc6a47c043a177f3145b262999d1361fac22b5a7d1a35e1784f71734d756795e8e403e49837b558e6b329dc1af9e031e31b5cb53b92dc34895087d6db52799da710bc3bd6b7675bce6b1a7624c2e104769c7ee58c64b355be3e1beac0456b8aa104203c2ad55d07bd330f3d72b786ead86d6a0d8914d63b5d8a2e6349c0e7a892bdc7593f98568ec4d118b7c763d397e4fab4c01ce8bc63b61cfe3aee98e2129cd4299f3faa0a00958b94a8cfc91d81743662cd9bcad431b6becae9ee89974d8effffc13c4877fbf50c72816eec04d8772a769c405f2335e4df763f24d2b2d686dd19a0ef6513d3ed6c1956042ff6657af1950a10bd84b3de710de77dd5da5dc5f52d1894d0fda5e4e23cb65c070dacb30122226eb5198ae6f2a9a4244744b556ba231742a349c022a71cda8af2703e84cde5f13ac95b05cd180cfd124d56caaf4a93e90cfc8ed9266b5e28aed17bc768543990476b8bbbf15f87b8d509767ecf5c330df6deb70904705196fedc86e10c9f1dcc0e1e4d7eedef2e211796cbe15f7b127cd53a9903ab340714902fcde08c623943f70166fa3c88f5a7c5d1aa479d6828dbe7664ca8e432998e67aedf7cd0b8fb4e87626770cd6a323ac4b0461fcb27ad571bd7b05b6286bd7df27f8f6392b888ec880f1f9428a89d253bde9a15b79a2825f0e2e00ce0b71c084c7f5f507e1c76da855ee6f28adfc00c4cb5cb78d3e446b1e88fd6db55b84fb9d56e58a320ae78e2cc87cfd37d08b51a7fe0b506db288ea13369840e6e639bf7b108730759597dd1f7a83aebe93092980d6d83d0f4361814a419a9c26d2028edd400dee88d904cd6597c5a8b3bd2e1c9e392755b8e0cc04dca5edaccf1a3c22155e86b6130eaa6b0282cb02f4885f39f0c56727fc50073b5f3b377242207cb392af7d8befcac304e1fb16f1254331ad26719cd74f1489e100b6e6d256556ff1a7aa6e610e40c4db540aabbfad7002d69c3c3397080f0f52623e47a14b3cca7a4f24bab2e8d2525266be2131dd590f9f74eda1812115a11b874ee8dd465315064891f668f106c6a351ead46a619eef20aa12e81fc2497abb6749f5f7c7e2f888fc55a473faf46b1d27cccc19d9a20923e337cabd793106fa53b3483b4dfff8a240674c93c2151c4cf0056af78ddd4a2c0ca73def9e4730a5d370b7c2857f296a6b7f3d30ec2994028d228dd78336b0796b3ae6e94edbab8e1b757124f7d68993dc0f13f385cb02f2f02d3d9c1bf9b57e6689a9dc22b6401e95371fce2c665507e817c94f73dbaf1be8f5ec9344c3f04dd8671b277f980853d4a9e8a957da25bb9b3e2d125c93ae8d57b971a5e74ed0fd423e125a56d271a3483f7a3b06b38971c365ab4361faeccf33461535803d1fdbf4bbe2cfaa99f91fa6104f5be51dca58a271cbaa4745aae18c9ebd8ca5d6ae926363356f3e74948419b5b563ad8b36d59a970ab62b52fd63318ec002ce6a06a4d401b7a02674c9dcdba3d18341457ae94adb2d04e901c0cf7a44ad8ac6d7d14c5f2a09a70c64977b5a1f063802ff9ecef3029d44d065b4d8fbc2dfe0708180ed36c836ca6f3094b28b8b90433208314ed050c519f3356ad7579772a9f582283192e85f81a50eb61529886e248254b9318fedb91f71b9945f9819e6dd61368fd5dec154d893d45dfa5d839113664751ce8ee556a40184656eea99529c6686f7c4f5c294e6f228978a33456540c02471e55bc8f52669003d742614416fc466ec7a372b8ca89468364b0b6ab95756fcf1b18b7246d1996d9dda1abc01749f16cbf1c93e481bbfd126aa97737014e215c8553cd2c444b0034fe88fc57463d4b061d212cd2f12c63aa460a1782f0c3f98e555c98eb3a07378c72f9bfcd5aedc50e4eed6ec5d4f198a1d481d6321f4dedcdd1add5592fbaed308e9662f8968d7f11f48e0db22608e4b201c21f0baa7c3680a7c43da3b31bfda4ebb7f58a46ae53c2b15859a0e3e4bfa30bd8ba0d3c0a8ee246898de7b2196c15aa61b9480fb02cd80c6d8ccdc5767a15f68d050db6b5d8ba1fb551bf1410127d7eb1dea5a144a17c1bd0975cfa480ad1280e35cbe4972f01ad4d309b519b2f51b87b871e1803a75a3d86f05a517dca91fd3ab45e26ed5196dd591007b008344841e41f7fefe1a4649ca19a699c56aa2c171840365594fc4d2662ff750a4ae6d5f7e6309185863b3120a934f2c1b1722a7972709017b165d212537be11900cb209d8a6b7aeb0495e74d910ab5e5d3a6d986e3fea58bacca6a9875fa296a595c46ba9e6dbefc7ca8d6e417d13c5d16f4258219e1b9336f30dc7b9e0ea924db28cae52aae2f28811c90ddf7efb7b61a688b7295f50dbe6af5f2575f1b39ff7400cc9ab01382b9a987a3a8393a28688862e3db5c522cc82faa09b74c87511adbd1b7a5a2ab0314beddd79d7c38ce6617196da6376ad2d8d1d7c65910dce8fc2daea846a185606b3cb9b21acbc328a5b28680a4510269564d5f4a632c6292517d07109b7ec922344a465ef4b96e6d90ed5e13ee1a2d20b64456c14d8b06f4b9b4ad010ac0bd69fcce04788c729c3dd43cd46f893c3c94ad97cd4996ed28875961b5497cdac6978c5e103d75951c466a5f943fd1543600e04ac3b10ff4b567df7cbd748b32a415ff7d1979773c5a7bd5576bb6e031c56efd1dc93e2ab13415775d4bf2ae7e7127f67e755e0da8710fd588757ec50cbdaee3221f71ed66d319beeda6eb8532634feb837944efc614e02b9825d54e60e232d0976759418d9259e345b8e17a4e54e8aa37319e97c50ead69ff8dd389c4be457f4b3f75abcb2ffbda53cbf5259bc1b1813ca4891eb2c1c0ddabd0aa8100aec17afa1f004ba8b3854201d820e26d99022983156ba7fffa3808cb830d9d908c7fd81d0456044678827db36adcc5bcbfce7557c06291d4e7f13cb485d50f409ca2012bcfa1b5bd0dedd9038e9ceb004a44a844e20ac0873789f52403b2843138fd74edf4fd8695accc5e9e97d623f0d415f294bf60529a6e51ce8998d49ccb7909bafbca4fec76a154c6cc2d639d20c35af5284ef9d76fa405c6e987b5652f0e88e95c4097b179898a10a0a912f9307798a389095d12e82cb8fd55c73dcf83e7feecb5fe01bad9ef8f4977ded063bc2feeaf797e4b7122b9ef60e77b3b0b5bf78857eb13bd3ca67e238882ca730e37e3e6d69bdc1d6d9b72d61642ef3e8b1aa9801c773f0be839ecb134de786b6aa483586af29dc74975c12c1da4f5a38d348a6131d38cdcb82f510503ea8338a04893913ea5f491d24d14de9987110114209f98a04d2e29836ecdd42eeb6cdc7694a0f7eecaedda7d88e5b3905f8432edfd79a081f78f5527231998f70c349f215d537d47cb3ce9a6f5034db9acb275f041218a6a49560ceb598f18166b8aa3955a3565c7bf6456b288b48581ab2bb69fd9b560e2c271d5d70ff6fd678c32f4903bb69ad6f989c62ccdcfe3d9b4d08a772f4167e3673a1951d8500c35bada426073a9d77c063f754e0555b4e6b53ecf02391b1d0c78a798fca538314cbcda19b97c83fe06cd491155ada643ac0e018f8fbbd6d708e60db97440a531c3cd3e6470fe5a950395bc1ec1fd1a18495aa3b6dc4ce753ffd24bef44dbcfb461c6866fe1d22d34a873722491b6dcbb0481ce1cfd5e9e12dc7e2ba06cf248ff32658c36acd5d210c544d63cdc453f9b8fff95fddd25561be1fdcb2983211e27b57880669086ffa333a7633755215b22648a09d22fbdcd2b9a4c1141302f7770f114897832b00fa6e22abbe7e1c35acbdcac3099e4220c469197611a03c0669d89103816b6ea1e6db5d4cd326d1e89fc116b3ec725d9292b78cbe7106bd99a1e82719af47b4b45340c92c78cb3b03a2e85de8f771dd97d54c336462bebef5a2c810418dbffc58410454b628f08a0bb0f1ad4724f48b7f56d4a5754fa9adf37b6f445110acff7448a50023310a1a109a2878afafdf858ed474af1a776f8a18c5390183b1762fc3b86dd6e1dcd01fecb309bdd0181cbe96a751fbc20aecb1fda554dcef4cc44e13564aea88b993bdfd86f32119417514655fe980450be66c8f66469f86af092608dc11e8fc5149f445d2bccbb1c1dab2ae83186c0742b66a6265f0ce7b2ba1ac34f0bd19eddf38e44fe110812259d98d248bfe400543f56afa779a73978b72e9529eb017f71de92f97406ed0d432604309aa0653539f46576a770f855fa6014895660f6b5b59e056f1743cb34f78b359cc5bf7d529fb2e642d8409a007214d1534f4514378d08a4a074ebc7acbab8a5b53676d2b721398eff9e129b5dc9127aff52dc66d41d81b85ac3117bc4df983a016f27f18a2b94e901ad4f5d61dd6b719230595d7a66e57c5e666308cee74d408e19380f85071a724a2017fd65f6bb0e5fd7614258dd765c715376634f4e84782bb83e4aac61ffe9e1119c2c70861505abdb5984541312bb80e14fcf0dbf374d89c47d936a6f09f06f08bef2531b0defc85f80a4f8e515d233612ae0cb04b018b8d62b79fd3f3af5d73430769458c2637af31e04ca4d2084863b27693d2755dc84b10bd8dc98f50fa111397f7d73e3ad03e3ce47c87c8f15b0990bfb02282a2de1a4f0ad17f6f5bd8ce0185844bd2a3b4533b7ea394a7186310ea4ecdaaa6646dd99d0ec754190d90b3dfdfc0fc37192b412ec5baff98e4818ebbf8dda14fefba42adba85df4795b4279558306c94ad37f356bcac916df451330231decd8fb44fef6f39f939652d4d67ae77721aad702d4ae5e8362140fcb2d594aec6fa54f72f3bd21b897536855842857cb744a0e8bcca618408dcd13a0e3939917276e7e6df2f3265b3bcb0bc437e47167fa252233790091ebb1277108bbaf949bf3e4e6f75a4d7f4cc5a7a025ac98aee9e59749915e1d74c3f5867b1ace3676421aabaa18b9698b125578b3f97afa952fd43dc9b65a45cf9bade138495cdcede49b8b1f1e85356a8ebbe3d3254c1fa5f3bdcc42ed6ced868f8b0b853abb9de83a8de2460c740527b83e78a1212daab5de6581c8fb60b8ab505e53e49a4d122b0b4f25c7b23d64781185a45f04ff89e405884a2988520511815debf9d87296449a8a820ee7a", 0x1000}, {&(0x7f0000000900)="e6a7c0d121d63ca339ff1aa4e84440b3b2cac3af349c2429431da408c395b8115a49b930f594fe4a8b582203", 0x2c}, {&(0x7f0000002000)="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", 0x1000}, {&(0x7f00000009c0)="1b3f61f85bab78f8bf4436f0c37f403b906cc078b29f0f87347a42cb6b2ab573a52844acfb8d425de31fa6594e66eb7acb86b539e06374268a0d14bc600c13751c2762596c624a9c9c69bcdb94a1289450c0982c7c213a54d7a4f2ebad844f5c786e3b3f6d7d1d160f9a745ca265a8497401380ee8f76c2189fb1da6e3e426e2ead76b9e32c6b3", 0x87}, {&(0x7f0000000a80)="1cfa4e157ca3ca8c139c054baa421dd79ccecb249946123903c91eede678221b531c423364", 0x25}], 0x7, &(0x7f0000003000)=[{0xa8, 0x0, 0x8001, "856cb1a816120f4a55adecba3c0b045231c36e54025e4fe1553e464c97e69efdcc837416d23dc685ddadc6e21b69e0a63b16af35271805b64c83c3a80744f793a47159b46337572c0ca56496811ef339785d2b2282961e03143d498032186e5f2fd9e1b2a8e2bbf823c2364304129ffb00fa1dc7b0e9a269c1086b598a1322e3f1f5d8056d654ea7f1da1b3f52226ee7f6e7"}, {0x30, 0x10c, 0x1, "3935abe8e5c4f5148e0ba65f55d33c872bcae3760517041b9fd5edfa4c5b"}, {0xd0, 0x104, 0x5, "035416b66c19a99da32fc118633913fe4f1c8c0be5ff3e8205d86a8dbb0bc8a70ceda3f8170554589b650bf38b142056f12add72db91da358dbf9624f345f552da37aa0fed5db0384ce535bcf25d5127ea2fa630f9fcfd497f596e9e655969689508f516a6555715b622cffad23d8c9344575466ec7d91fa4f3a22f273f8b491088a4ce54eba1ade530920f4fcffc6cfa561e932cb02b77d3001c9bcb784542dd72e8df3c21b84f72dcab7f1ff339825c9fc9b6a3353fbe7461d19"}, {0xa8, 0x112, 0xf6f, "127847487be052446b7f3de5c3da0e706f1227759cf4d3697185afea0efcb5ec247531b68c40aab5e68a4e7e5296f498eaaa4048c79b632f572f7b0f1d7aec67f68e07e4f5e4b78adcf727bd59033cd58e80617558bc7ed6a78269fb5d997993220bcc60d3890fdd4ceeaa464448ea5b5003825b955fa7fa89eb2c4f922f243e6d67472d60c32f16317658cdde30ca5b9edc"}, {0xe0, 0x116, 0x25, "6fea4230e67d049a549f58c32cf3e381466840e576905c62453bdf0f98e517926d8732b91a20e2f29365d2f2dea6d9e39ba661aea8dce2b5ab3edfb8bdf4893453fb7f26d9578b2610e23209681cddccc7847573496a6290827817fa35165127c454ec50505fc83ac2e6276972963ae10425046c2caa7fd20d5feacf16be03b71387cd9a34aa0bbbf7e8a6bb05e1037c5ce4c50528da994839cd781dcd5391f292f5930771f0326a042437c3880522405ddd5cce947549438ba964f83679e0c8ea32bda225f99d483544415ba0"}, {0xf8, 0x114, 0x3f, "64b18975d51028bfef73541f22318259f356f2ae58d40eabe7c09c234a8277799c30da14fbfca0482e94b1db85d95228db5af38d26f1af5b2bf60bd7f36aa7926ba5ad1cc759ef75d17d613b68bb3ad520ccb94526a5adb661cc280cf5588d0281c2822a2b8b0e9f8e03b2d6920c89e5a53bdc013c4ef7d3b954e98e6e60813db637891e1e3eadc69ac101078ec2b7f66ef6a9f485517419374da0e158e9151f10a04248c69f5ad50125ca3bd20c6904d961a14d46bfcc73cb0b22c70cd898aeba042ab233abba6e5b175e2bf1d634b26c2174051470aac7320fcab7a6fccc0eaaedc7b87277a4d3"}, {0x40, 0x109, 0x8, "a2ddfa53ee385a44e417c1ed71b1a7c9f046aea0e6f6a6d48aceac9b162fcfeeff08c86c05c0a99ab3"}, {0xe0, 0x103, 0x2, "d2c176a176c881182f3a02569357986dff3975d7aef52733415729d05ec3eeebc06b427d36c26baa7c7985df5a50f36010444ac5d5ffbdd1c762355e0bf809d756c9ec23c813556db888a333f81b4f095c56693e6b386f9caf02e499af5cf64609bde216e93b679309b4219679647d02a08416077f389164f107f3d57e8f8f0c18befc4cf067c1c44a7c7bf1037fe821aa3b0036b0cea71d87b7a7e4911f96d67b13c7f3f1e4795333e87be1c36c4690ff733fe3cf60c98d8158adca66578b573b34ffb4825f2980e0bfb236"}, {0x78, 0x10a, 0x436c14cc, "fc72c73f60e0b2677506f4798e227de55a5762cfd2492bfccabcacfd6467f4d5e4a7edbc5299bafefb54b10ba4d051c2b8e974acd7240c309fd2700a3dcb5bbae3674ecad07936ea6b3379d3efc57c779b6b2bfe661ff443ca9b96561dd72465de3668"}], 0x5c0}, 0x81) dup(r4) r5 = accept4(r1, 0x0, 0x0, 0x0) r6 = syz_genetlink_get_family_id$devlink(&(0x7f00000004c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xc4, r6, 0x2e, 0x70bd2b, 0x25dfdbff, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x2}}]}, 0xc4}, 0x1, 0x0, 0x0, 0x44015}, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(r5, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x48, 0x0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x2}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0xc001}, 0x4000004) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000003c0)=0xffffffffffffffff, 0x4) sendmmsg$sock(r5, &(0x7f0000000f80)=[{{0x0, 0x47, &(0x7f0000000b80)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1, 0x0, 0x3d}}], 0x2, 0x4004881) connect$phonet_pipe(r5, &(0x7f0000000040)={0x23, 0x7, 0x20, 0x1}, 0x10) 17:32:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000080)="c5301ae2bad446449ef2", 0xa}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96", 0x30}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x4, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xe, &(0x7f0000001940)=[{&(0x7f0000000580)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000151827440b0000000004000008000000d2c200001203", 0x66, 0x1}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1002}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {&(0x7f0000000640)}, {&(0x7f0000000200)="24d46652d35c77510eefa54946c2350f8b383b8df1db4d6fc658ec31685f9a448864cf70c8800cae74086e77dc59b6671e7bf39fa911c89989881ac1f89f1479a7380d95eb5fe51d8f3bc71f53ba6a7c2a3544c69be949b921b02c8f242312bf0632959bd4c31717c57191fd4935bd8189f1a16ad41ac8e2563954b593f3b8186a94e1bc892c8f03ca6b031c1b7186e9d9892a51c9870dd3354597aa370d5816d30f9c23e3dfe128d9009965423e24dc964bc578a2b4e1ded584c5a91c4039f2b96e7ef5ed94b68269c7d949028c20fc639ed2411b1559a6b6390e251f0b8c17026b4ec0e4c17a68c5d996a9", 0xec, 0x2}, {&(0x7f00000017c0)="27ba348efd52f634a5d23d8170d483fbf4c03d1ba5fa1147bd08baff180b57216f59ac78c5577f21e7dd45844960427b935a0015858d086465dee0fed6dd50297d5145858ac278ac775f996b789ff42f0f2951673799e600e7c0df291c1bb29d79bbaf96b379beb099a7b02303113c74b890c13a862f0f6c511a53ee14a03f48ef943df332897caf9e78f19e", 0x8c, 0x6}, {&(0x7f0000000640)="d7899111d4f87c0c20bef74c750676f8ef82c2f889dc5ee8c8c332c548f17ea255d264ee25c6043b0094903a7ae5e23bf16ed2d8248f4730b5106dfce0", 0x3d, 0x1}, {&(0x7f0000001880)="e042d0822829166a6827bbd6ed009243cd940afac91298916d06ba5db39399cd042a627d695e560c3b40e68b96f45c3c40d17f24e2790e0ef7f9eef0d7cf78accb25699d04aa1970635f622e9d6e6b98cc282278ef5280e7a9800bf85ce99dcaeb620966ef052b6bd40c1b22bd17313b9306d40b26ad084d25429048e7bea61f328f2dc1c0a77ef72f84263d", 0x8c, 0x4}], 0x0, &(0x7f0000000600)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) sendmsg$NFQNL_MSG_VERDICT(r6, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x268}, 0x1, 0x0, 0x0, 0x80}, 0x4000050) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r10) ioctl$BTRFS_IOC_SNAP_DESTROY(r5, 0x5000940f, &(0x7f00000007c0)={{r10}, "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"}) r11 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$SNDCTL_SEQ_CTRLRATE(r11, 0xc0045103, &(0x7f0000000080)=0xfffff000) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000040)={r6, 0x4, 0x1ff00}) r12 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) fchown(0xffffffffffffffff, 0x0, 0x0) [ 383.768886] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:32:56 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000007c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$squashfs(&(0x7f0000000040)='squashfs\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000140)="fd3d732dab73304aca04e98660b3a76d5ce2c1925be4ce4fcd1cdd8053dad4709fb36ae28b843dc60e00e5d6ee8b4578c7a3745bdcdccb556b4c5564b8139600d053785c26fe4d297defa118", 0x4c, 0xfffffffffffffffb}, {&(0x7f00000000c0)="8620ad26338128bc8567bb2ca05e8214037e049a", 0x14, 0x4}, {&(0x7f0000000300)="a741051bf2d0c34482310b1f68b2a19c606da6b12d1e4ec8e0a0f47688199368e4b20c092bc524676f44b0179095dd362d1e655b71ac0605eae99f256502b9ee5334cc357197930a4978ce71b8dce08306d27a5d5287239f5ba3277541038d12e788b82ca77a16851f7c32f4187affa018a83c017b27445438e31f9b8c6bab4bc07b7a1837f73c1b3bdc2c93258c68afd32434b8989a0bfda6f2e8dc", 0x9c, 0x80000000}, {&(0x7f00000003c0)="3607ca9a88353c582210b58b070c3fb8d865a1b065b65844135c8ef5071917e8e42c0954cd8d38773adf93384d45320368f49bc7a25cb41628038f11f1d3d2607ed03a4e5f2dbd4835dc12a8cccd7daaeb023475192466a20fb850370d63cbc8a503f2437d2641e46570934972a85ca6490cf74336b46b49e992614f9681060f2072ca92b77d77c51ffcf764577a4c6a0c778cdd753929a6b312c2908581342ebbd802cfa6969c8accf78ed2fb2289880a5292069e29da15892ea23cf0472634769454", 0xc3, 0x5d}], 0x80020, &(0x7f0000000540)={[{'+<'}, {'security.ima\x00'}, {'ext4\x00'}, {}, {'%---'}, {'ext4\x00'}, {'security.ima\x00'}, {'ext4\x00'}], [{@subj_role={'subj_role'}}, {@audit='audit'}, {@fowner_lt={'fowner<', r1}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '#@$'}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@hash='hash'}]}) 17:32:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r3, 0x0, &(0x7f0000000000)) [ 383.950267] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 17:32:56 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x9}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f000000000000010080000000100008000000000100040000000000000000000200000030", 0x38, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f00000000c0)={[{@debug='debug'}, {@minixdf='minixdf'}, {@journal_dev={'journal_dev', 0x3d, 0x1}}]}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r5, 0x110, 0x5, &(0x7f0000000040)=[0x3], 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000300)={0x8, {{0x2, 0x4e20, @broadcast}}}, 0x88) faccessat(r8, &(0x7f0000000080)='./file0\x00', 0x108) [ 384.087285] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:32:56 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[@ANYBLOB]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x200200, 0x20) fchown(r0, 0xee00, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r1, 0x1, 0x53, &(0x7f0000000080)={0x6, 0x7, 'syz1\x00'}, &(0x7f00000000c0)=0x28) [ 384.266601] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 17:32:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c7", 0x31}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 384.323036] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 384.331860] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:32:57 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x80) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) rmdir(&(0x7f00000000c0)='./file0\x00') r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$vmci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vmci\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$qnx6(&(0x7f0000000140)='qnx6\x00', &(0x7f0000000180)='./file0\x00', 0xc9, 0x4, &(0x7f00000003c0)=[{&(0x7f00000001c0)="625ff4dcbef582a8b78d2ac02f", 0xd, 0x7}, {&(0x7f0000000300)="ee73e38af5f370d098516fb0d77c6cba6ee0f3af425c08d7af0013a33358843a802669505e3915e88a6e1dfed15baaae0c52b4cfb583c92ed84f4972d7e6b858", 0x40, 0x9}, {&(0x7f0000000340), 0x0, 0x20}, {&(0x7f0000000380), 0x0, 0xfffffffffffffffa}], 0x0, &(0x7f00000004c0)={[{}, {'\\W@$'}, {'\\$*)$\\/='}, {'*+'}], [{@fsname={'fsname', 0x3d, 'security.ima\x00'}}, {@euid_eq={'euid'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ext4\x00'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@pcr={'pcr', 0x3d, 0x3f}}, {@dont_measure='dont_measure'}, {@fowner_gt={'fowner>', r3}}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}]}) fchown(r0, 0xee00, 0x0) 17:32:57 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xd, &(0x7f0000000580)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="5d626094629b8ee8ba1f7998138cb003e3c43e8f7e1386c271d8ed0a40f4d9abb4c44deb7ca3ed6ed44b531fb77d7a1b91fbca6727a19eefc533df3e247ef30ee2573fd7b50cd392fe3da190347162483961b2074aef488dca01ab183325aba997783e5c37ea4c0639d1a0187249089ec4fde5b7f88bcc87a62f743a0273bb339e8c2b949a7fc3412c", 0x89, 0x3f}, {&(0x7f00000004c0)="f031584ddf07b240ef2a0ff2422c59b3fff39c4292e270a1d106ab7eaded0f9d1a5e19155e737cbcd92fd90c7bbd28432910d13d456b8e2fd82bb0c3edd21fd6e1aae52547ba1f8a1e108176ee98a9b004e6cb411f49b3a58955b38e95cc1199105bf4598bd8fc4b0a478789567e7980d7b1a15e63a2c73d955795827553532dfe5cff8d55e6b1d44b7c2d894c201fc3626409d2af73869b", 0x98, 0x8}, {&(0x7f00000003c0)="4eb9c184d9b4d3786e073a9796a3290b1a07d80b8f48709334204fc30a78460c794301753288083bc2b63abf53be5eb5a8fcc2fe5d82a6dcd22e7458add8c0868b8a6af99615327856d61b6c06", 0x4d, 0x8}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) connect$phonet_pipe(r2, &(0x7f0000000040)={0x23, 0x4, 0x21, 0x7f}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') fchown(r0, 0xee00, 0x0) 17:32:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r3, 0x0, &(0x7f0000000000)) [ 384.579715] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 384.596655] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:32:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="627300040000005c072c2f6c64616c6c6f632c00"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nvme-fabrics\x00', 0x680881, 0x0) fchown(r2, 0xee00, 0xffffffffffffffff) [ 384.867646] EXT4-fs (loop2): Unrecognized mount option "bs" or missing value 17:32:57 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="820111c3ecb588bca549a939c186608f414605bb3992178080d67f36895da9429cdef11bb960ed88838684f42caeafcf3d8cb9149686d03475142bc850544f58261ddb4cb45d857bcd83242725f20a24e2ec7d074ca3480c5145c85df2e912a0fd31ce60114a04b78e1d480659ea947cf2affb774a1f8307d50c77e391668cfc2f"]) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e23, @private=0xa010100}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e20, 0x3f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x1}, @in6={0xa, 0x4e20, 0x4, @private2={0xfc, 0x2, [], 0x1}, 0x68}, @in={0x2, 0x4e23, @rand_addr=0x64010102}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e24, 0xe8, @dev={0xfe, 0x80, [], 0x29}}], 0xb4) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf64(r0, &(0x7f00000009c0)={{0x7f, 0x45, 0x4c, 0x46, 0xfe, 0x5, 0xff, 0x3f, 0xff, 0x3, 0x0, 0x1, 0x153, 0x40, 0x3a9, 0x0, 0x101, 0x38, 0x1, 0x7, 0x100, 0x3}, [{0x6, 0xbeb46c51, 0x9, 0x3ff, 0x600, 0xfff, 0x7, 0x100000000}], "cfee924e7737a1008ae7ddf7d647144833f5e359ca29eb25f61469d589dcbda319b2d646d859e80d7bc37113a8aa69de6e5472dd90a84827c9c7ebe9aab66c1e968c3c3ba3135c51af95f1f2b201d85a37fa785d5b3f545b0a23412481bff53b09c700cfbce8ae10f3a4d28c391daf80a59eba5f2aed402b9e87240be8b5786650e1942887895db3ab1a842213672f0d321a15f65d69c86f340c5b832a218c22c98f846701e72f8e129b441638066a9a9040146d34cdae1320680f06be23a082f447c3a12a4b499e973670153491d300b5b21e811f981cf856f2b70638da5d44cce29e83447270d404144a37fe812ddf9412f441ac764a", [[]]}, 0x26f) fchown(r0, 0xee00, 0x0) 17:32:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {0x0}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 385.038861] EXT4-fs (loop2): Unrecognized mount option "쵈I9`AF96]B`툃" or missing value 17:32:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmmsg$sock(r3, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r3, 0x0, &(0x7f0000000000)) 17:32:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[@ANYBLOB="f1"]) ioctl$SNAPSHOT_CREATE_IMAGE(0xffffffffffffffff, 0x40043311, &(0x7f00000003c0)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) syz_mount_image$hpfs(&(0x7f0000000040)='hpfs\x00', &(0x7f0000000080)='./file0\x00', 0x8000, 0x2, &(0x7f00000000c0)=[{&(0x7f00000007c0)="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", 0x1000, 0xa2}, {&(0x7f0000000140)="5d28202a82b10335fc8d5f97f0b883c0d6d8bf8f6df2e77ef6153720d3e294ba7c28ae271915d266e287b5cb617bc451c42de1ddaa350b40c28595785c5a3151c47d1284a188fc9ee16cc502678d0dfa5211f5858027b7cba5b615b167b0e157cfdea888124008158a5d70281c0a1954faee481bf9770a7188d6118cf4c28eb382d4a70d236d3eb14ca25358b02574890a075301", 0x94, 0x2}], 0x100000, &(0x7f0000000400)=ANY=[@ANYBLOB="2f2c65787434002c253a1db72c73656375726974792e696d61002c6d6561737572652c6f626a5f726f6c653d7d2c736d61636b6673666c6f6f723d73656375726974792e696d61002c6673757569643d32633036326351392d633139022da96363362d336433642d35316366383635642c6f626a5f757365723d65787434002c7569643d", @ANYRESDEC=0x0, @ANYRESOCT]) 17:32:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {0x0}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff1f, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 385.552328] EXT4-fs (loop2): Unrecognized mount option "쵈I9`AF96]B`툃" or missing value 17:32:58 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0xffd}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xa01, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x28000, 0x0) ioctl$RTC_PLL_GET(r3, 0x80207011, &(0x7f00000001c0)) r4 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3ff, 0x103000) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f00000007c0)={'filter\x00', 0x7, 0x4, 0x408, 0x0, 0x210, 0x0, 0x320, 0x320, 0x320, 0x4, &(0x7f0000000080), {[{{@arp={@private=0xa010101, @local, 0xff, 0x0, 0x2, 0x10, {@mac=@multicast, {[0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}}, {@empty, {[0xff, 0x0, 0xff, 0x0, 0x80, 0xff]}}, 0x998, 0x83aa, 0x8, 0x0, 0x1, 0x7fff, 'ip_vti0\x00', 'caif0\x00', {0xff}, {}, 0x0, 0x106}, 0xc0, 0x100}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f5969de945f089911a7982729889463d946502d2154ac3b6e0f2e56f5b0c"}}, {{@arp={@loopback, @dev={0xac, 0x14, 0x14, 0x36}, 0x1fffffffe, 0xff, 0xc, 0x10, {@empty, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}}, {@empty, {[0x0, 0xff]}}, 0x7, 0x64d4, 0x40, 0x2, 0xfffe, 0x9f0, 'macvlan0\x00', 'veth0_macvtap\x00', {}, {0xff}, 0x0, 0x4}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="8ffd1bdf22a4", @mac, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0x2, 0x1}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@broadcast, @rand_addr=0x8, @empty, 0x1, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x458) [ 385.624337] EXT4-fs (loop3): Unrecognized mount option "" or missing value 17:32:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 385.724114] EXT4-fs (loop3): Unrecognized mount option "" or missing value [ 385.744690] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 768)! 17:32:58 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xfff, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0xfffffffffffffdf4, 0x400}, {&(0x7f0000000040)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0xb92}, {&(0x7f0000010300)="03", 0x1, 0x4}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30001}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r2) mount$overlay(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)='overlay\x00', 0x29a2044, &(0x7f0000000300)={[{@xino_auto='xino=auto'}, {@index_on='index=on'}, {@default_permissions='default_permissions'}, {@metacopy_on='metacopy=on'}], [{@obj_role={'obj_role', 0x3d, 'security.ima\x00'}}, {@subj_user={'subj_user', 0x3d, '-'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@permit_directio='permit_directio'}, {@dont_appraise='dont_appraise'}, {@context={'context', 0x3d, 'unconfined_u'}}, {@seclabel='seclabel'}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@fowner_gt={'fowner>', r2}}]}) fchown(r0, 0xee00, 0x0) [ 385.811728] EXT4-fs (loop2): group descriptors corrupted! [ 385.883004] EXT4-fs (loop2): ext4_check_descriptors: Block bitmap for group 0 not in group (block 768)! [ 385.914601] EXT4-fs (loop2): group descriptors corrupted! 17:32:58 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1ffffc, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="cc727143bd19af5004d9bc5a5e4c238e5eed7bbf00c6a724a5e6c1756213d5a8a82aab798a3f4802d7655a58994070"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fchown(r0, 0xee00, 0x0) 17:32:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {0x0}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 386.103733] EXT4-fs (loop2): Unrecognized mount option "rqCPټZ^L#^{" or missing value [ 386.186386] EXT4-fs (loop2): Unrecognized mount option "rqCPټZ^L#^{" or missing value 17:32:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000040)) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f00000000000074a201000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) r4 = socket(0x28, 0x800, 0xff) getpeername$packet(r4, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000004c0)=0x14) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) fchown(r3, 0xee00, 0x0) r7 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x16000, 0x0) setsockopt$sock_int(r7, 0x1, 0x2b, &(0x7f00000000c0)=0x401, 0x4) 17:32:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 386.321649] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 386.432405] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:59 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@ng={0x4, 0x1, "2f4d168d57d9498ef360"}, 0xc, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000140)={@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x32}}, 0x0, 0x3, 0x2, 0x2}}, {&(0x7f0000000300)=""/231, 0xe7}, &(0x7f0000000040), 0x60}, 0xa0) mount(&(0x7f00000000c0)=@sg0='/dev/sg0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='omfs\x00', 0x22004, &(0x7f0000000480)=']\xbe]++\'%\x00') fchown(r0, 0xee00, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) 17:32:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff8880994c6738, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:32:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:32:59 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) ioctl$SNDCTL_DSP_SYNC(0xffffffffffffffff, 0x5001, 0x0) [ 386.664663] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 17:32:59 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r4, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @random="73a1082beefd"}, @NL80211_ATTR_SSID={0x1e, 0x34, @random="4879c35c831966c25f86c897f1fff13ef6d20f5b4537df12e163"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}], @NL80211_ATTR_MAC={0xa, 0x6, @random="6b5eca812fbc"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x4, 0x7f, 0x9], 0x3, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r7, 0xc01864b1, &(0x7f0000000100)={0x57d, 0x3, 0x3, 0x3, &(0x7f0000000080)=[{0x1, 0x7fff, 0x2}, {0x4c, 0xffff, 0x7fff, 0xce}, {0x5, 0x5919, 0x9, 0x5}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r6, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) [ 386.811764] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:32:59 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[@ANYBLOB='@']) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:32:59 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r4, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @random="73a1082beefd"}, @NL80211_ATTR_SSID={0x1e, 0x34, @random="4879c35c831966c25f86c897f1fff13ef6d20f5b4537df12e163"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}], @NL80211_ATTR_MAC={0xa, 0x6, @random="6b5eca812fbc"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x4, 0x7f, 0x9], 0x3, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r7, 0xc01864b1, &(0x7f0000000100)={0x57d, 0x3, 0x3, 0x3, &(0x7f0000000080)=[{0x1, 0x7fff, 0x2}, {0x4c, 0xffff, 0x7fff, 0xce}, {0x5, 0x5919, 0x9, 0x5}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r6, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:32:59 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r4, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @random="73a1082beefd"}, @NL80211_ATTR_SSID={0x1e, 0x34, @random="4879c35c831966c25f86c897f1fff13ef6d20f5b4537df12e163"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}], @NL80211_ATTR_MAC={0xa, 0x6, @random="6b5eca812fbc"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x4, 0x7f, 0x9], 0x3, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r7, 0xc01864b1, &(0x7f0000000100)={0x57d, 0x3, 0x3, 0x3, &(0x7f0000000080)=[{0x1, 0x7fff, 0x2}, {0x4c, 0xffff, 0x7fff, 0xce}, {0x5, 0x5919, 0x9, 0x5}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r6, 0x6, 0x15, 0x0, &(0x7f0000000180)=0x35) 17:32:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 387.107987] EXT4-fs (loop3): Unrecognized mount option "@" or missing value 17:32:59 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r4, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @random="73a1082beefd"}, @NL80211_ATTR_SSID={0x1e, 0x34, @random="4879c35c831966c25f86c897f1fff13ef6d20f5b4537df12e163"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}], @NL80211_ATTR_MAC={0xa, 0x6, @random="6b5eca812fbc"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x4, 0x7f, 0x9], 0x3, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r7, 0xc01864b1, &(0x7f0000000100)={0x57d, 0x3, 0x3, 0x3, &(0x7f0000000080)=[{0x1, 0x7fff, 0x2}, {0x4c, 0xffff, 0x7fff, 0xce}, {0x5, 0x5919, 0x9, 0x5}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f00000003c0)=0x1, 0x4) [ 387.209666] EXT4-fs (loop3): Unrecognized mount option "@" or missing value 17:32:59 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$PNPIPE_HANDLE(r3, 0x113, 0x3, &(0x7f0000000040)=0x6, 0x4) 17:32:59 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r4, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @random="73a1082beefd"}, @NL80211_ATTR_SSID={0x1e, 0x34, @random="4879c35c831966c25f86c897f1fff13ef6d20f5b4537df12e163"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}], @NL80211_ATTR_MAC={0xa, 0x6, @random="6b5eca812fbc"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x4, 0x7f, 0x9], 0x3, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r7, 0xc01864b1, &(0x7f0000000100)={0x57d, 0x3, 0x3, 0x3, &(0x7f0000000080)=[{0x1, 0x7fff, 0x2}, {0x4c, 0xffff, 0x7fff, 0xce}, {0x5, 0x5919, 0x9, 0x5}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) [ 387.391109] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff8880a46f7e38, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:00 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r4, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @random="73a1082beefd"}, @NL80211_ATTR_SSID={0x1e, 0x34, @random="4879c35c831966c25f86c897f1fff13ef6d20f5b4537df12e163"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}], @NL80211_ATTR_MAC={0xa, 0x6, @random="6b5eca812fbc"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x4, 0x7f, 0x9], 0x3, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r6, 0xc01864b1, &(0x7f0000000100)={0x57d, 0x3, 0x3, 0x3, &(0x7f0000000080)=[{0x1, 0x7fff, 0x2}, {0x4c, 0xffff, 0x7fff, 0xce}, {0x5, 0x5919, 0x9, 0x5}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) 17:33:00 executing program 3: ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, &(0x7f0000000140)={{0x2, 0x0, 0xfff, 0x2}, 0x36e, 0x2, 'id0\x00', 'timer0\x00', 0x0, 0x6, 0x1, 0x8, 0x80000000}) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000300)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x3}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x122000, &(0x7f0000014a00)=ANY=[@ANYBLOB]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:33:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:00 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r4, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @random="73a1082beefd"}, @NL80211_ATTR_SSID={0x1e, 0x34, @random="4879c35c831966c25f86c897f1fff13ef6d20f5b4537df12e163"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}], @NL80211_ATTR_MAC={0xa, 0x6, @random="6b5eca812fbc"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x4, 0x7f, 0x9], 0x3, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r6, 0xc01864b1, &(0x7f0000000100)={0x57d, 0x3, 0x3, 0x3, &(0x7f0000000080)=[{0x1, 0x7fff, 0x2}, {0x4c, 0xffff, 0x7fff, 0xce}, {0x5, 0x5919, 0x9, 0x5}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r8) 17:33:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:00 executing program 3: setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) fchown(0xffffffffffffffff, r1, 0x0) 17:33:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:00 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r4, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @random="73a1082beefd"}, @NL80211_ATTR_SSID={0x1e, 0x34, @random="4879c35c831966c25f86c897f1fff13ef6d20f5b4537df12e163"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}], @NL80211_ATTR_MAC={0xa, 0x6, @random="6b5eca812fbc"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x4, 0x7f, 0x9], 0x3, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r6, 0xc01864b1, &(0x7f0000000100)={0x57d, 0x3, 0x3, 0x3, &(0x7f0000000080)=[{0x1, 0x7fff, 0x2}, {0x4c, 0xffff, 0x7fff, 0xce}, {0x5, 0x5919, 0x9, 0x5}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) 17:33:00 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) 17:33:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:00 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r4, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @random="73a1082beefd"}, @NL80211_ATTR_SSID={0x1e, 0x34, @random="4879c35c831966c25f86c897f1fff13ef6d20f5b4537df12e163"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}], @NL80211_ATTR_MAC={0xa, 0x6, @random="6b5eca812fbc"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x4, 0x7f, 0x9], 0x3, 0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r6, 0xc01864b1, &(0x7f0000000100)={0x57d, 0x3, 0x3, 0x3, &(0x7f0000000080)=[{0x1, 0x7fff, 0x2}, {0x4c, 0xffff, 0x7fff, 0xce}, {0x5, 0x5919, 0x9, 0x5}]}) [ 387.982672] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:01 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r4, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @random="73a1082beefd"}, @NL80211_ATTR_SSID={0x1e, 0x34, @random="4879c35c831966c25f86c897f1fff13ef6d20f5b4537df12e163"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}], @NL80211_ATTR_MAC={0xa, 0x6, @random="6b5eca812fbc"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x4, 0x7f, 0x9], 0x3}) 17:33:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="66f5cf3e07fa65a822e6f2b0adc902c9c23c45b0baa2df7e90b240b21a2346cf29434cbc85ed201205af548bd2e2a781c6fc18c5526b7d31a5e51a6941ae5c7058d83fb01d597340afdb7ab213477457e771d6cd31f05b54aad6cb456dd5a534c259517105"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000140)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000000300)={0x6, 0x0, [], {0x0, @reserved}}) 17:33:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5", 0x19}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 388.681758] EXT4-fs (loop3): Unrecognized mount option "f>e"0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r4, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @random="73a1082beefd"}, @NL80211_ATTR_SSID={0x1e, 0x34, @random="4879c35c831966c25f86c897f1fff13ef6d20f5b4537df12e163"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}], @NL80211_ATTR_MAC={0xa, 0x6, @random="6b5eca812fbc"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) socket$inet6_tcp(0xa, 0x1, 0x0) [ 388.796996] EXT4-fs (loop3): Unrecognized mount option "f>e"0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:01 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x94, r4, 0x20, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @random="73a1082beefd"}, @NL80211_ATTR_SSID={0x1e, 0x34, @random="4879c35c831966c25f86c897f1fff13ef6d20f5b4537df12e163"}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@device_b}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x21}], @NL80211_ATTR_MAC={0xa, 0x6, @random="6b5eca812fbc"}, @NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x5}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 17:33:01 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="000000b0030000000000000091b73ef4b8d944c400000023fd2f4a6c010040", 0x1f, 0x8}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000140)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080522a9d39b4c3bc5d16b6ca9f6dda72037a437aed85bb82dc0643c7e4591e59000000000000", 0x42, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000001c0)=ANY=[@ANYRESOCT]) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/seq/clients\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$SNDRV_PCM_IOCTL_INFO(r1, 0x81204101, &(0x7f0000000300)) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x1, 0x7fff) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "840a00"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:33:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:01 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) [ 389.061866] EXT4-fs (loop3): Unrecognized mount option "01777777777777777777777" or missing value 17:33:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0a000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5", 0x19}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:02 executing program 3: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) fstat(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0, 0x0, 0x5}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r2, 0xee00, 0x0) 17:33:02 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:02 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 389.664853] EXT4-fs (loop5): Can't read superblock on 2nd try [ 389.747881] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 389.758733] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:02 executing program 3: setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000000c0)=0x7ff, 0x4) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000020000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000b0000000004000008000000d2c200001203000000000000000000", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="6a9f015273ae32f33e2747b58e55cacf53d03d1fb9b0c3f4c17085142cba155524000b9eb1da511839e27f53bcec3ce784bdd84b3e7d6bad8d56f123aef10000000000000000c2900ff7af60d7c7f3bcd5d943ddd62f6fc6890000000000000000000000fd241920f2ad9ed48b7ee656d1c824074a655dfa6101d7f8ab4077234f59cfb131614ed5d68e0e01611d794042d4bc38215a38f5fef564dbcfd1f19709b9e018eec4709cdb799ced61170e595a2f7263ca751ba595c2272a198639130a5d3165"]) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x8cf0, 0xbe, 0xffff, 0x4], 0x4, 0x1000, 0x0, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000300)={{0xffffffffffffffff, 0x0, 0x3, 0x0, 0xd2f4}, 0x6, 0x6, 'id1\x00', 'timer1\x00', 0x0, 0x6, 0x8, 0x2, 0x101}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) r2 = creat(&(0x7f0000001b40)='./file0\x00', 0xc) tee(r0, r0, 0x7, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getpeername$unix(r5, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) bind$llc(r2, &(0x7f0000001b80)={0x1a, 0x33, 0x2, 0x3, 0x7, 0x8, @multicast}, 0x10) socket$bt_hidp(0x1f, 0x3, 0x6) 17:33:02 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="16000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:02 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 389.957466] EXT4-fs (loop5): Can't read superblock on 2nd try [ 389.988973] EXT4-fs (loop3): Unrecognized mount option "jRs2>'GUS=p" or missing value [ 390.089199] EXT4-fs (loop5): Can't read superblock on 2nd try [ 390.111975] EXT4-fs (loop3): Unrecognized mount option "jRs2>'GUS=p" or missing value 17:33:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5", 0x19}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:02 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet(0x2, 0xa, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="25000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:02 executing program 3: ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000040)=""/174) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:33:02 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet(0x2, 0xa, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 390.339118] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440), 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:03 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet(0x2, 0xa, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 390.446159] EXT4-fs (loop5): Can't read superblock on 2nd try [ 390.464505] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2d000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440), 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:03 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[@ANYBLOB]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='\x00', 0x3, 0x7, &(0x7f0000000540)=[{&(0x7f00000000c0), 0x0, 0x1ff}, {&(0x7f0000000180)="0b3f7c20177c5a03453ca7a817d367c50bcbc09a399fcd17fcc3a2c5dc65983fcf8884f8e0ca5dd092b1a9c474bb5c6a9f99742d15f8eb71087a6bc1bc116892b89170", 0x43, 0x4}, {&(0x7f0000000300)="e409b0ac751ba3eac9736e5e14c8656d7b090eb28e46f32f388b0026167232139be5b94965841a3da1f305ddae139ca0cc70a0981c61c241a5a3e2292a5dd9d9bd30b3120df54abb999eaf96e8a6ff0d68a6de1e0ef288bac4d370d8ba28ffb2ef872d9175deb63a38c7f9fe99c2cd565582401b02c6672eba5b0768211f5dd565b63f7b8b4909ca3214fef9595b7bf470ebada31c57e4e25c87dbdf8dcd84e0bae0b4fac80da4e2f6f9b3fb913cb29c94057b2422bd5e4c", 0xb8, 0x200}, {&(0x7f00000003c0)="5274027e0a2f488a95beb2cf6882c498b4954b358ea0052ddc842550d3e43466e2d698c70d52716637cb040cc0d444818010c65d4672f0284876f5d650744aa6a7fd368b776f8218c7b024bd5946c595398375b03a823ebfe3e0753a727a3cd8c9490b70611ecc9e086b96dfc93a0e278c778ddbcd14fcc4fa93b55c67fa7e8229e3db51fec8792ba0f8432801f0934d38a3a8069cd13177831fcbfa", 0x9c}, {&(0x7f00000007c0)="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", 0x1000, 0x7}, {&(0x7f0000000480)="387252bd9a36cf28bf06950dbfb41f5e758c92815488dec6e4e15cdb127aaf1a2bd800b0bb4a0503cbd12be2f4130c8c873dc1d467334fd28f3da99abce01ac1363c8c", 0x43}, {&(0x7f0000000500)="620baccbc4853677a1dc3bd465972b90aba615db0a4d582c7bb5765b52517a53b497bc8ea08774e1221b358ff37095d5322d1fafbccc", 0x36, 0x6b2c}], 0x2000000, &(0x7f0000000600)={[{@nobarrier='nobarrier'}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}, {@bsddf='bsddf'}, {@sb={'sb', 0x3d, 0x6}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6c4}}, {@data_err_abort='data_err=abort'}, {@minixdf='minixdf'}, {@usrjquota='usrjquota='}], [{@audit='audit'}]}) r4 = syz_mount_image$qnx4(&(0x7f00000000c0)='qnx4\x00', &(0x7f00000006c0)='./file1\x00', 0x82f8, 0x2, &(0x7f0000001980)=[{&(0x7f00000017c0)="ed1562abbd00720d0ab0a952be3f5a381392d2935a56fa6b9ef85fc1f89db4307b6076b2ac1ab49d016428453632429a11e2ccff5ef0e9e0b3632ad5398ad1ae394d2634012b677eebbc943fb7bf8ca5988af10b615dc15b5c96f12bc0ac7e1711da291d66378bb9121636f250ab13e127e2d850d562758701f134336ee617f76449a4550e086d96e67a2868b1dab2812fe566086a3063699bddde38e744a7363e2998101717e223c1331510086c6d8c20", 0xb1, 0x240c6b27}, {&(0x7f0000001880)="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", 0xfa, 0x5}], 0x800, &(0x7f00000019c0)={[{'-\'&^\xb6'}, {'-\x13'}, {'security.ima\x00'}, {'ext2\x00'}, {'sb'}, {']!%'}], [{@fowner_eq={'fowner'}}, {@smackfsroot={'smackfsroot', 0x3d, 'bsddf'}}]}) r5 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) fstat(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r6) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000001b80)={0x1, 0xb59, {}, {r6}, 0x8, 0x9}) r8 = syz_mount_image$romfs(&(0x7f0000001a40)='romfs\x00', &(0x7f0000001a80)='./file0\x00', 0x3, 0x1, &(0x7f0000001b40)=[{&(0x7f0000001c80)="75be7751ee3018feee690596420ba73b2b247669dbe40fb3c051c18b8074d7a486fc5176385643b1111637ca4436c2d64c533297f18c8f6ae2c5d55717e3000718fae3b33f0185d41a0d7f09891e0a6f815362f119cf4cc8338bef5d418331bfea837167373479e4a25be47856de1b93e8a0d0", 0x73}], 0x24a80a, &(0x7f0000001d00)={[{'\x00'}, {}, {'mi\xb4=+\x86E\x003,}\x83\xba\x11nixd\xe5=\x15\xcb\xe0#\xdfs}\xc7\xf7\xc9o\x82H \xad\x9cj\xde\xbc\x9c\xe4\xf9\xdc\xb3\xce\xc8M\x98U\xc6\x86d^\xe0Z4'}, {'usrjquota'}, {'*'}, {'debug_want_extra_isize'}], [{@smackfsroot={'smackfsroot'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x62, 0x37, 0xaa, 0x36, 0x61, 0x36, 0x65], 0x2d, [0x64, 0x66, 0x37, 0x36], 0x2d, [0x36, 0x39, 0x33, 0x37], 0x2d, [0x32, 0x32, 0x61, 0x32], 0x2d, [0x64, 0xe, 0x37, 0x61, 0x66, 0x37, 0x33, 0x61]}}}, {@euid_lt={'euid<', r7}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}]}) dup3(r8, r4, 0x0) fchown(r0, 0xee00, 0x0) 17:33:03 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d", 0x25}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 390.677014] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440), 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:03 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 390.776194] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 390.791424] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="41000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:03 executing program 3: setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000040)=@srh={0x67, 0xc, 0x4, 0x6, 0x7, 0x0, 0x3, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @private2, @private2, @ipv4={[], [], @remote}, @ipv4={[], [], @loopback}, @loopback]}, 0x68) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140)='batadv\x00') ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl0\x00', 0x0, 0x2f, 0x40, 0x1, 0x9, 0x44, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x700, 0x20, 0x1, 0x4}}) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x44, r1, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r2}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1f}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8000}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040004}, 0x24049891) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000440)='/dev/bsg\x00', 0x1, 0x0) ioctl$BLKGETSIZE64(r3, 0x80081272, &(0x7f0000000480)) fchown(r0, 0xee00, 0x0) 17:33:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b", 0x8) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:03 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 390.953746] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:03 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b", 0x8) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 391.039318] EXT4-fs (loop5): Can't read superblock on 2nd try [ 391.059412] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="60000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:03 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x41, &(0x7f00000004c0)={'filter\x00', 0x9c, "3d6e6b6ae0792a37edee78e79040d721646a38d2fb68ec79518f638e0ac1a639a197afa84294fb974b28a07f95d74ec429e2e8652c95a2d1bee90ab0ba31251258ccab687e7206fc0ed4c83b2250250004d76f9ff554e0c0d91c324583494c1a8a3ea2d7a3c2819ede9420483c86aa28c08a440775131ed14d13f5a0c689446758f1b60f56269ccefe59c0a13d98be9dd2fdad42bc28e77fbe604ae1"}, &(0x7f0000000080)=0xc0) getsockopt$nfc_llcp(r2, 0x118, 0x3, &(0x7f0000000300)=""/221, 0xdd) fchown(r0, 0xee00, 0x0) 17:33:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b", 0x8) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d", 0x25}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:03 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac", 0xc) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 391.281945] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:03 executing program 2: openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcsa\x00', 0x200000, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 391.338822] EXT4-fs (loop5): Can't read superblock on 2nd try [ 391.359243] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="f1000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac", 0xc) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 391.579515] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac", 0xc) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 391.664917] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="f2000000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) socket$bt_rfcomm(0x1f, 0x1, 0x3) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:33:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d", 0x25}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca3", 0xe) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 391.873461] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="cd030000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 391.979148] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca3", 0xe) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 392.098879] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:04 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="004065a7b9b875c18385d733822493590000000000000001a70f2f6fc1bdb8301e092b2b"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) [ 392.139458] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca3", 0xe) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 392.220709] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="f1ff0000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e11175", 0x2b}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c", 0xf) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 392.425063] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 392.466124] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 392.502407] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:05 executing program 3: ioctl$VIDIOC_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, &(0x7f0000000040)={0x5, 0x0, [], {0x0, @bt={0x7, 0x100000, 0x0, 0x1, 0xbf0, 0x6, 0x4, 0x3, 0xebad, 0x1f, 0x80000000, 0x80, 0x7, 0x5, 0x4, 0x10, {0x4, 0x1}, 0x0, 0x2}}}) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:33:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="f2ff0000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c", 0xf) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c", 0xf) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 392.730738] EXT4-fs (loop5): Can't read superblock on 2nd try [ 392.744413] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:05 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000000300)="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", 0x108, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x3ff}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x9b1}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[@ANYBLOB="1b"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:33:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e11175", 0x2b}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 392.821173] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="f1ffffff000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 393.019139] EXT4-fs (loop3): Unrecognized mount option "" or missing value [ 393.115507] EXT4-fs (loop3): Unrecognized mount option "" or missing value 17:33:05 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x10000000000000aa}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ef41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0, 0x0, 0x2}], 0x28, &(0x7f00000000c0)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(0xffffffffffffffff, 0xc0106401, &(0x7f0000000140)={0x57, &(0x7f0000000180)=""/87}) 17:33:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 393.351153] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="f2ffffff000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:06 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) r1 = add_key$fscrypt_provisioning(&(0x7f0000000040)='fscrypt-provisioning\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)={0x2, 0x0, "17589c59c476b0abff5b436dd968d452c241f16982e011083bbad3963953a37ba6749929bf46053c517e4508a00dc010cc818f1d7baab6de248cc15d11db31d45041a9f67a6d8909382c57fd127fe9815f39966fa4dbad68f9a54dc8780dcab045e02757f59a342f02cf5ba3b1c0b4527d79bdfba577f54ba2030e2aa28074dbbd213e2b353b7f2d0a"}, 0x91, 0xfffffffffffffffc) keyctl$update(0x2, r1, &(0x7f0000000300)="8db9721ddc0aa03ef40d5f8c6a568cfc6413806f9ed69e3c8682cdc582590cca5b64766bd69d9f7d4527032442bc352b8b49064b6683cfa513ec807bb6923b8a311d2ea337c7461d5ca14675b52e5f7dfceb98098c8315aa497f3c835baa6a9c3cc612c5ba8d8f8cbdda8ddf86f97821fc4043f62b4b9fe73d7a3d9641200b571a5a555f8bacfd1f0500331a7dbd1eb6ba3db248ca8da83cf89fe1e1d06d7d4aea1c449635d0b347edc13b6cde8d093f7ae946a99d210793a4ce60d45dd229254f1279420dda1abaa5927fa9a1b932b6c8d533e6e807e9c734dc94", 0xdb) 17:33:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e11175", 0x2b}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 393.606976] EXT4-fs (loop5): Can't read superblock on 2nd try [ 393.642820] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:06 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) r1 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x400, 0x106) sendto$rose(r1, &(0x7f0000000300)="291cda837151750efa5cc4ade88cff27facfe8c649e78b1c50991123493130dd8f1c37db426c25b9d15b47922988033c0b792be93b0493ef192159a02784c70e31a29ccd76c2d33c77e48edecf84784c155077259d54546eeea93ddeafbcb55ae821bf5ecadfb72f914acc0bf6684e0c39411e0165608c3ee710c94e2e3830292ab7dceb91e7a4fb9261486207b570407e33c5280f3e8c72cb7c73c27368ab9531adcd6c739bc798526c28ba830feb6e8d41a222893bb60b4da2488fd611eb4b245e742ac57f138829ed0c365e287ffb54fb63", 0xd3, 0x4081, &(0x7f0000000180)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, 0x1, @null}, 0x1c) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) [ 393.691263] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20020000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:06 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:06 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 393.867899] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20030000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:06 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="ad95d50022ac88275ffa9630e08b906082700054371569c4c503ee215196610200"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) [ 393.944709] EXT4-fs (loop5): Can't read superblock on 2nd try [ 393.965041] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f1", 0x2e}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:06 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, 0x0, 0x0, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 394.134461] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, 0x0, 0x0) 17:33:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, 0x0, 0x0, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20040000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 394.215053] EXT4-fs (loop5): Can't read superblock on 2nd try [ 394.221224] EXT4-fs (loop3): Unrecognized mount option "" or missing value 17:33:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, 0x0, 0x0) [ 394.335375] EXT4-fs (loop3): Unrecognized mount option "" or missing value 17:33:06 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000a9c6000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) [ 394.406544] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, 0x0, 0x0, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, 0x0, 0x0) [ 394.525690] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f1", 0x2e}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20050000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) [ 394.629736] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}], 0x1, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:07 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="31cbaaec113367d2e89debf281da8d"]) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$sock(r2, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x5, 0x0, 0xc, 0xf9cd, 0x14, 0x18c3c10b}, 0x9c) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) statx(r0, &(0x7f0000000300)='./file0\x00', 0x6000, 0x800, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() getgroups(0x4, &(0x7f00000004c0)=[r3, 0xee01, 0xffffffffffffffff, r4]) fchown(r0, 0xee00, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmmsg$sock(r6, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) sendmsg$nl_netfilter(r6, &(0x7f0000000580)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000540)={&(0x7f00000009c0)={0x314, 0xf, 0x5, 0x201, 0x70bd2b, 0x25dfdbfc, {0x5, 0x0, 0x3}, [@nested={0x235, 0x5, 0x0, 0x1, [@typed={0x4, 0x85}, @generic="95519d924f26186f298b4bc6badfeb7c4ac4ad32dee286c65c337f00f1db72e763f4476ed746e513d809a4262e8678390b30a89726e925a78b814f4f39155a57225a712ce88def3b35a6e40a7dbb61f3", @typed={0x14, 0x4f, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, [], 0x31}}, @generic='Sc>U/{', @generic="79ad586f69942a71ba82d2779171647a62d90a6059f7953ef09824d14708b0a911c9f540c0e75ae5e7599df5a109af7f990d71fb873bd00891c66b2d98d93f36c6ce1e3bf996d497e7f1e544643d1410ec7b9a41a78ffc0db78696d03cf940be5712a5a0dbd883a634a284da9c12ee34", @generic="ed51d0c63cacbf99d7e32df9ad574fcaa41812d690db24210572d1f8ddceb05f0474c03cf9e6d4e15cac0c62fcaae52eb23ddaca167d37966c6084f7dbbaa09391d6b6db181930ca642e89e267b03481e4b211c28a038f5d0cbc243f861b5af432bc59a7a21018e7e41a92b0d2a66580f7e7ae0e9888bba777883b3a4abb1b08945e8814730395867d384daf68106229af1e40edeb0c909f44526159e6e00a", @generic="e0d9f964", @generic="ad010d7ac2b80f85db9f2bcb3f3a20f9fdf8bb3cb155c3bb2c2581ccd5910f451d32249817086560a2400b3c847741acc85dd99d1a23069ec46c05b3c35f99c2b694f0ded29b942769543f4dd51170c87e8fb5746d974084e1bac23d71260c0699e7b4113b9ea0d31da0efc2454d0ec28c84c3d46f123154428f47d475f5fbae6f62a78f0ece9b42be172b7625e088ed8f6028c2653b437d49fd7753a312c2daf2b7fd427df56abcdf6bf820bce0bcbf"]}, @typed={0x16, 0x1, 0x0, 0x0, @binary="791956ff0bb3e49bd3a18929b4a35de94d40"}, @typed={0x8, 0x95, 0x0, 0x0, @pid}, @nested={0xa8, 0xf, 0x0, 0x1, [@generic="af7e396f953218f79033be25bc8b6c8a8f7731fe62ac6b5b49b4b6ab0a052368ebeea19c7517d5d2b04ab8db5af022073ff60b04185cf6f41ef391b0f4980741e18fb3a3d5a9936e59d9a6bde769cd534b72937033eeddc03595d72a331b0e53b8dcfced1ffe932fe5f9e2b7d12f38c63e63d701553ba0aa960f1cad1048664e1fac9a280feea98088b17ba79ccbbb8aa28e4d2beb16262fc55a395feb8472940aa80f43"]}]}, 0x314}, 0x1, 0x0, 0x0, 0x8895}, 0xc080) 17:33:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) [ 394.829227] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}], 0x1, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 394.907151] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20060000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) [ 394.972352] EXT4-fs (loop3): Unrecognized mount option "1˪3gڍ" or missing value 17:33:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}], 0x1, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 17:33:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 395.158344] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f1", 0x2e}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20070000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 395.264899] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 17:33:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 395.486439] EXT4-fs (loop5): Can't read superblock on 2nd try [ 395.559926] EXT4-fs (loop3): Unrecognized mount option "1˪3gڍ" or missing value [ 395.577292] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00000010000100050c10000000000000000000", 0x58}], 0x1) r3 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00bd1b86ed3f7a4afb1288e483aaed58094e7c733099d03ebbd7cace6ce5884b83af5d8d57c14017953bdd22488b6a8d2cd0fa89a571c9fea40118a30b3fd2e4c294a0fef81ef81e4150ae5d5faf97510de842"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) utime(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x1, 0xffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KDGKBTYPE(r6, 0x4b33, &(0x7f0000000180)) fchown(r3, 0xee00, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x480, 0x0) removexattr(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)=@known='trusted.overlay.redirect\x00') 17:33:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 17:33:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20080000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:08 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96", 0x30}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 395.804319] EXT4-fs (loop5): Can't read superblock on 2nd try [ 395.864409] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20090000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 395.932995] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:08 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) sendmsg$AUDIT_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1e86c5ef011c5747}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3e8, 0x2, 0x70bd26, 0x25dfdbfc, "", ["", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4840}, 0x2004000c) 17:33:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 396.125441] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 396.196986] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200c0000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 396.266853] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:08 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000000080)="200000000002000019000000900100000f0000000000000002000000060000000000084469813742adc3000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x6d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="03000002"]) fchown(r0, 0xee00, 0x0) 17:33:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r3, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 396.469273] EXT4-fs (loop5): Can't read superblock on 2nd try [ 396.495543] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 17:33:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96", 0x30}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r3, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 396.605454] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 396.614512] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20100000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:09 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000140)={0x0, 0x200, 0x7, {0x3, 0x8}, 0xfffffe01, 0xff}) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)={[{@acl='acl'}, {@prjquota='prjquota'}, {@nojournal_checksum='nojournal_checksum'}]}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r1, 0xee00, 0x0) 17:33:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r3, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 396.849860] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) 17:33:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20160000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 396.920929] EXT4-fs (loop3): Project quota feature not enabled. Cannot enable project quota enforcement. [ 396.953868] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 397.065121] EXT4-fs (loop3): Project quota feature not enabled. Cannot enable project quota enforcement. 17:33:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) 17:33:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 397.175618] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="76f836077274f196e3cad10cc083277e03ca544a89655fdfd97ef346c78c83e4b64da421eb4db9f764cd08d2ef9e5a00f1ae8c4ff512195cd6f758f9beaac726b0975d6020f09261959ab320d0b540c59f271bb146db96394627ff7dcf4202291d6926660f25bc8503e977d0d9", 0x6d}, {&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96", 0x30}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x3, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 397.262126] EXT4-fs (loop5): Can't read superblock on 2nd try [ 397.278303] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20230000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:09 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) tee(r0, r1, 0x97d1, 0x1) accept4(r1, 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f0000000040)={{0x0, 0x0, @identifier="3162988c4f2321e1385106526fdc988e"}}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:33:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x68}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_QOS_MAP={0x18, 0xc7, {[{}, {}, {}, {}, {}, {}], "f470e4fc9e0a6c9c"}}]}, 0x34}}, 0x0) [ 397.470812] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x1, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 397.538249] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 397.547815] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x1c, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) 17:33:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="202d0000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:10 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001ef0000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000000300)="0225c4b2e7d2000000030000000400000019000f000300040000000000000000000f002e6961117b41884c314e592d2b3d66b647e2469ceea737bfe0e450d35cc72375d448ff8bb12513ba571b439cb3542d1c743d29a8fb844ca8ed47e5ade470887642a2eaf1948ec822a532f32357b8c02d0be622f4d6ce4c71247be2044b48916699f705cd2310c01de122105bc0fb8e6bff0b54490ee60811fb8358e65f08435fc4a2cd0fd09f1967b02cd32708303b7098022e3df36565e002a19db003ad420511e85869dc0a00", 0xca, 0x1800}, {&(0x7f0000000040)="ed418f423dec0000d4f4655fd5f4655fd5f4655f000000000000040080ce3f1f97988697021c4ecade5616d14bad19bba838e3e0901028a856c7d8779fd25bae453d010c66f59a66cb9e80222d342510b168150e9eb1fa49cc8653b54214a1a867bf8694a9abcb00acfa54a4bf02000000b152be60", 0x75, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x50002, &(0x7f0000000140)=ANY=[@ANYBLOB="1a006d6d69743d3078303030303030303030303030302b2c6e6f7265636f766572792c6f6c64616c6c6f632c0000002fef424a5e436c35a6187bf1691d7a63804cc27edb69d2376c113d831f17672a1cff362b6b4a48f5eac000bbb82fe8297a8ed596e74730ebba8b48ce668d68608866ec071ae80a47b78ff00eda61bfb69726897fc980c7ac57710165be44faac7b65629dc185c4"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:33:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x1, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:10 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000140)={0x0, 0x200, 0x7, {0x3, 0x8}, 0xfffffe01, 0xff}) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)={[{@acl='acl'}, {@prjquota='prjquota'}, {@nojournal_checksum='nojournal_checksum'}]}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r1, 0xee00, 0x0) 17:33:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="3fe102df76f2827ed7b7e510a7e12e5888ac596d74a7b574d5d60b3867cbb6dcdfcd83464d051036e111758f50f14e96c7", 0x31}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x2, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x1, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 397.835030] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:10 executing program 3: write$usbip_server(0xffffffffffffffff, &(0x7f00000007c0)=@ret_submit={{0x3, 0x3, 0x0, 0x0, 0x80}, 0x1, 0x18, 0x3, 0x46, 0x5, 0x0, "e7267516128dbeba9edaa01daad975529957c84a2e37111f", [{0xfffeffff, 0x7, 0x3, 0x6}, {0xffff, 0x1, 0x1, 0x6}, {0x80, 0x8, 0xfffffff9}, {0x3, 0x3, 0x6}, {0x1000, 0x3, 0x10000, 0xff}, {0x5dc6c573, 0x7, 0x2, 0xffffffe0}, {0x6, 0xaa8, 0x1, 0x7}, {0x1f, 0x9, 0x4, 0xa2}, {0x7ff, 0xffffffff, 0x8001, 0x2}, {0x5, 0x4, 0x3ff, 0x4}, {0xbec6, 0x1f, 0x7, 0xfff}, {0x3, 0x2, 0xffffd917, 0x8}, {0x0, 0x401, 0x4, 0x9}, {0x100, 0x68e6eb80, 0x3}, {0xe45, 0x3ff, 0x1, 0x884}, {0x2, 0x3, 0x7fff}, {0x1f, 0x8, 0x6, 0x401}, {0xff, 0x2, 0x7ff, 0x9}, {0x4, 0x4e, 0xd9, 0x2}, {0x9, 0x8000000, 0x401, 0x1f}, {0x200, 0x0, 0x4, 0x3e}, {0x8, 0x9, 0xc9c, 0x6}, {0x1ff, 0x1, 0x2, 0xfffffffa}, {0x6, 0x1, 0x7, 0x9}, {0x9, 0x4e, 0x6, 0xf60e}, {0x7a1, 0x1, 0x24, 0x100}, {0x6, 0x4, 0x9, 0x546a}, {0x2, 0x5e, 0x6, 0x1000}, {0x200, 0x7fff, 0x2, 0x1}, {0x80, 0x7fffffff, 0x7}, {0x0, 0x1000, 0x101}, {0xffff, 0x1, 0x2b4d}, {0x1, 0x400000, 0x80, 0x3}, {0x4, 0x1, 0x1ff}, {0x7, 0x3, 0xfffffffa, 0x1}, {0xff, 0x2, 0x0, 0x3}, {0xb3, 0x0, 0x7f, 0xfffffe00}, {0x5, 0xfff, 0x401, 0xfffffff8}, {0x4, 0x1, 0x9, 0x9}, {0x80, 0x5, 0x80000001, 0x1}, {0x1, 0x2, 0xb8, 0x2}, {0xffffffc1, 0x1000, 0xce2, 0x3}, {0x6, 0x2, 0x3, 0x1}, {0x0, 0x7, 0x7}, {0x76f5d29a, 0x10001, 0x35, 0x1000}, {0x0, 0x40, 0xa0a, 0x200}, {0x9, 0x10001, 0x3e, 0xffff}, {0x80, 0x5, 0x200, 0xa9}, {0x86e0, 0x2, 0xfff, 0x3}, {0x6, 0x7, 0xff, 0x20}, {0xc88d, 0x0, 0x200}, {0x4, 0x2352150b, 0x40, 0x101}, {0x6, 0xfff, 0x4, 0x5}, {0x8, 0x532, 0x1, 0x1}, {0x80000001, 0x90, 0x9, 0x4}, {0x5, 0xfffffff9, 0x4, 0x3f}, {0x4, 0x0, 0x4, 0x3}, {0x1, 0x7, 0x0, 0xe2a}, {0x2, 0x1fbccce4, 0x1f, 0x6}, {0xffffffff, 0xba1, 0x1, 0x3520}, {0x0, 0x7fff, 0xa9c, 0x2}, {0xd4f7, 0xe3a, 0xffffffd5, 0x9}, {0x7f, 0x3ff, 0x2, 0xffff}, {0x76d49c0b, 0x6, 0x5, 0x6}, {0x2, 0x387, 0xe8, 0x1}, {0xfffffffc, 0x200, 0x8001, 0x4}, {0x7, 0x5, 0x3ff, 0x5}, {0x9, 0x0, 0x6, 0x4}, {0x312d, 0x3f, 0x0, 0xc3}, {0x2, 0x3, 0xff000000, 0x2}]}, 0x4a8) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) [ 397.967238] EXT4-fs (loop2): Project quota feature not enabled. Cannot enable project quota enforcement. [ 397.987326] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20480000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:10 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) r1 = getpgid(0x0) sched_setparam(r1, &(0x7f0000000040)=0x7fffffff) fchown(r0, 0xee00, 0x0) 17:33:10 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000140)={0x0, 0x200, 0x7, {0x3, 0x8}, 0xfffffe01, 0xff}) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)={[{@acl='acl'}, {@prjquota='prjquota'}, {@nojournal_checksum='nojournal_checksum'}]}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r1, 0xee00, 0x0) 17:33:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="204c0000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 398.221118] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 398.283837] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="23c9706f7214b93af3b5488ecbf342173f6f70eafa2c7d2b5059dd9b0c6a49b7ee56769dea66ae3cf5e4270a455ba61f4a"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r1, 0x0, r2) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="0c30360dff"], 0x5, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f0000000140)={0x3ff, 0x0, [], {0x0, @reserved}}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:33:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x2, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 398.392923] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 398.414747] EXT4-fs (loop5): Can't read superblock on 2nd try [ 398.424459] EXT4-fs (loop2): Project quota feature not enabled. Cannot enable project quota enforcement. 17:33:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20600000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 398.460162] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:11 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000140)={0x0, 0x200, 0x7, {0x3, 0x8}, 0xfffffe01, 0xff}) r1 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)={[{@acl='acl'}, {@prjquota='prjquota'}, {@nojournal_checksum='nojournal_checksum'}]}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r1, 0xee00, 0x0) 17:33:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x2, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 398.682589] EXT4-fs (loop5): Can't read superblock on 2nd try [ 398.700012] EXT4-fs (loop3): Unrecognized mount option "#por:HB?op" or missing value [ 398.806650] EXT4-fs (loop2): Project quota feature not enabled. Cannot enable project quota enforcement. [ 398.824402] EXT4-fs (loop5): Can't read superblock on 2nd try [ 398.836049] EXT4-fs (loop3): Unrecognized mount option "#por:HB?op" or missing value 17:33:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:11 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000140)={0x0, 0x200, 0x7, {0x3, 0x8}, 0xfffffe01, 0xff}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)={[{@acl='acl'}, {@prjquota='prjquota'}, {@nojournal_checksum='nojournal_checksum'}]}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) 17:33:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20680000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:11 executing program 3: sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="30009603", @ANYRES16=0x0, @ANYBLOB="20002bbd7000ffdbdf25110000000a0009008d01906eb2e70000060028000100000008003a00ff030000"], 0x30}, 0x1, 0x0, 0x0, 0x11}, 0x10) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:33:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {0x0}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 399.088864] EXT4-fs (loop5): Can't read superblock on 2nd try [ 399.104489] EXT4-fs (loop2): Project quota feature not enabled. Cannot enable project quota enforcement. 17:33:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x2, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:11 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000140)={0x0, 0x200, 0x7, {0x3, 0x8}, 0xfffffe01, 0xff}) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)={[{@acl='acl'}, {@prjquota='prjquota'}, {@nojournal_checksum='nojournal_checksum'}]}) 17:33:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="206c0000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 399.177957] EXT4-fs (loop5): Can't read superblock on 2nd try [ 399.197647] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {0x0}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:11 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xaaaacbd, &(0x7f0000000200)=[{&(0x7f0000000380)="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"/350, 0x15e, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4655f00000000000001008000000000000800000000000af301000400000000000000000000000200000030", 0x38, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="636f6e746578743d7c6f927400040000000000006861743d636f6e746578742c0043c9b5158041d0bc5fb17850e6fcd78d93ff6d41d04b08153abe7f39dbabcf13602d8fe1476c8afe700d133bb6d15eae666acc4125bc065c40c1"]) r1 = syz_open_dev$dmmidi(&(0x7f0000000500)='/dev/dmmidi#\x00', 0x7, 0x400) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) nanosleep(&(0x7f0000000640), &(0x7f0000000680)) r2 = dup3(r1, r0, 0x80000) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000540), &(0x7f0000000600)=0x4) fchown(r0, 0xee00, 0x0) syz_mount_image$cramfs(&(0x7f0000000040)='cramfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="0a8de780fc93d33f7345b7386933b1613a8da4e01c8ac500d69428ead8da2d103cebb77f51bf19ebe401ef61551fb005d0b5dd045d1a5aa6ea89472336a783e468e95a0f9d827d02281bfcb21bcae16be6e3dba23890729fc62fd6b4946d845844f2bb40ce4ab840c5d50462c2c9ccc5a769fac1530b95e66fd437139cb77cabb3", 0x81, 0x4}], 0xc0420, &(0x7f0000000300)={[{}, {'^'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@euid_lt={'euid<', 0xee01}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x55, 0x37, 0x39, 0x32, 0x32, 0x62, 0x4], 0x2d, [0x31, 0x31, 0x31, 0x33], 0x2d, [0x39, 0x37, 0x66, 0x35], 0x2d, [0x65, 0x63, 0x5e, 0x32], 0x2d, [0x66, 0x62, 0x32, 0x33, 0x34, 0x38, 0x61, 0x65]}}}]}) getpgid(0xffffffffffffffff) 17:33:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {0x0}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 399.394687] EXT4-fs (loop2): Project quota feature not enabled. Cannot enable project quota enforcement. [ 399.409452] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:12 executing program 2: dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)={[{@acl='acl'}, {@prjquota='prjquota'}, {@nojournal_checksum='nojournal_checksum'}]}) 17:33:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20740000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 399.515492] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x2, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) [ 399.659085] EXT4-fs (loop2): Project quota feature not enabled. Cannot enable project quota enforcement. 17:33:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000180)}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 399.706320] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)={[{@acl='acl'}, {@prjquota='prjquota'}, {@nojournal_checksum='nojournal_checksum'}]}) 17:33:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000180)}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="207a0000000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 399.846599] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000180)}], 0x2, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 399.944111] EXT4-fs (loop2): Project quota feature not enabled. Cannot enable project quota enforcement. [ 400.035902] EXT4-fs (loop5): Can't read superblock on 2nd try [ 400.133823] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:12 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x9d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) 17:33:12 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)={[{@acl='acl'}, {@prjquota='prjquota'}, {@nojournal_checksum='nojournal_checksum'}]}) 17:33:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x2, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {0x0}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000300000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {0x0}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) 17:33:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)={[{@acl='acl'}, {@prjquota='prjquota'}, {@nojournal_checksum='nojournal_checksum'}]}) [ 400.531549] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {0x0}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 400.691278] EXT4-fs (loop5): Can't read superblock on 2nd try [ 400.698465] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 17:33:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20100400000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:13 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000000500)="111fc0d901000000803a0900803a09000000000006db75bda9c27eeb031e3c9265ec0986cb121a07096a0a05cbf451fcb1afafb267afed80f980e9d10dea7eb403dc6875cc74e2ffbe294c36119f93da6a4c8ea3674f62bd5ad7f0ccd95a8e5983b8597f1698a97ebfb6b56f5e90552103d3564a4b755b522042fb557e87df06bf88634f65384c3a5ac432f0167ae554e578e92034cff8472ca2129e705c2edac806f6ee9f3bc75bb7dc767978d4123c6d4a732012be004aff3b6731e6042f74", 0xc0, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000480)={0xffff, 0x18, [], 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0]}) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNGETSNDBUF(r4, 0x800454d3, &(0x7f0000000180)) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000226bd7000ffdbdf250a000000060028000400000008003200030000000500350092000000060028000200000008003b002d050000"], 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x20004009) 17:33:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(0xffffffffffffffff, &(0x7f00000032c0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)}, {&(0x7f0000000340)="9c28b76a68b34d30369c9a474b9f0016d137ab11373fb0c3d9b5e303e87b582ebddd718f12214a82105e502191b62f46fdb2fc761b579e8dd8cb6d55579d22a64b9ada7561a89352bce74d127cc553702e3371530beaaf2f3ad8c7d1636a2e3bc9753dccc17e15bc92e7329e354ba04d8d837b21553ba78b1d359be327ec4966b7a00b8040bc1c7ebf90148e2feb497774be846a07032d168ab1f06f8d91", 0x9e}], 0x2, &(0x7f0000000640)=[{0x10, 0x0, 0xfffffff9}, {0x70, 0x100, 0x10000, "fb764863c34f4a9c987247265e593fe64b2c61368d8e0a54d2c02cdc3d2e1e87e831f5a2a6f30620f735c780e448b76a9dbf8e423d8a4722ab937b36e2b0753c3e069dfedb8309a2aa7ee64560417c466a65a546e42e6634a689e2"}, {0xd8, 0x115, 0x3, "e08e27fd16aff88d61764e533139d582bfa21f146011771e4effbd6e6e6a7199822b591a0bc4df92be09c6657be2ab2591d490a1e4aa404d79c9bf1f39842c482320c6f9cc5ca3e4c7281742289044073ec45aca21613928d404104ee008b87a970ac75588649056580b128fbb0abe30cb085f1cde62abac8ace2967a700cd7e16123b228bbfd5c0e16270b8f9c94572f1f4f11a42e6f20571f2296128a6ea5e95a9b6bd1aeb1126ce9374c1b21753e4030b671a57025cb58d45885ec0eae6a194"}, {0xf0, 0x0, 0xd4a, "2e0d90ec84877a1610393813b228679ef14e966a3659a06d416df6abbf02a2d1983140e4b08ab54007774aa57f82890dea29da6bdb7fdc9a3b00ab76229818940527037eabdf086568aabf54dab6f8d19a26937eb53b9be1be02045902ffd646c5c757d33327043aa4fc48a1e965120b0123564cfdffe6d1c7ee6d01b95dcd5e01278005ca19e9ebe25044aa73c1c2de07fba059c031757b92d7e277e0b9fad7fd1f3dd31cf1d3316641f8eacd827733e0733cb56dc2e391d56a933676e7ddecae934c05e2e26c9e827ff5cd238b71f5e9823905f502492940e679d57e1c"}, {0x18, 0x116, 0xb33, "e5a56c"}], 0x260}}], 0x1, 0x4040004) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0xf}, {&(0x7f0000000140)="5531f5e79d1230ddde98e2f96ff18ba13900c35e67d75c5a6808890239fb4c7dde6a19", 0x23}, {&(0x7f0000000180)="e31520aa566f0e3686390a8b9a5e851d473b7f3f48f1cab37f45b3adf98590fe02c1bb355a5d7ba1193e0f1b8da27a3185d39bb2f03d2665a8220e0b301f45542d83e05d03a32b5d4d26b012d5763340bebd3fc37f86adfa618871ae0af56300de382edf1aa89e0d", 0x2dd}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x20000481}], 0x1}}], 0x2, 0x24004880) 17:33:13 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)={[{@acl='acl'}, {@prjquota='prjquota'}, {@nojournal_checksum='nojournal_checksum'}]}) 17:33:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 400.902837] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000440)="cb56b6cc0407008b65d8b4ac2ca35c66", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$sock(r4, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="018ee9f82e", 0x5}, {&(0x7f0000000140)}, {&(0x7f0000000180)}], 0x3, 0x0, 0x0, 0x1a0}}, {{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000480)="92", 0x1}], 0x1}}], 0x2, 0x24004880) accept(r4, 0x0, &(0x7f0000000000)) [ 400.976879] EXT4-fs (loop5): Can't read superblock on 2nd try 17:33:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000500000200dd18000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001fffffffffffffffd0000000004", 0x5a, 0x400}], 0x0, &(0x7f0000000080)={[{@max_batch_time={'max_batch_time'}}]}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:33:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', 0x0, 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000000040)={[{@acl='acl'}, {@prjquota='prjquota'}, {@nojournal_checksum='nojournal_checksum'}]}) [ 401.081954] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 401.128678] Quota error (device loop3): qtree_write_dquot: Error -344014167 occurred while creating quota 17:33:13 executing program 3: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000000040)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000014a00)) setxattr$security_ima(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.ima\x00', &(0x7f0000000780)=@md5={0x1, "8e61e27c90edce35b222147c4cbeb255"}, 0x11, 0x0) fchown(r0, 0xee00, 0x0) [ 401.223894] BUG: unable to handle kernel paging request at fffffbfffd6fd874 [ 401.231011] PGD 23fff1067 P4D 23fff1067 PUD 23fff0067 PMD 0 [ 401.236814] Oops: 0000 [#1] PREEMPT SMP KASAN [ 401.241310] CPU: 1 PID: 8130 Comm: syz-executor.3 Not tainted 4.19.158-syzkaller #0 [ 401.249097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.258456] RIP: 0010:check_memory_region+0xc8/0x170 [ 401.263556] Code: 39 d0 74 0e 80 38 00 74 f2 48 85 c0 0f 85 9c 00 00 00 5b 5d 41 5c c3 48 85 d2 74 f6 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 e8 <80> 38 00 74 f2 eb d8 41 bc 08 00 00 00 48 89 ea 45 29 dc 4e 8d 5c [ 401.282458] RSP: 0018:ffff888095da79c0 EFLAGS: 00010282 [ 401.287821] RAX: fffffbfffd6fd874 RBX: fffffbfffd6fd875 RCX: ffffffff81c1032e [ 401.295091] RDX: fffffbfffd6fd875 RSI: 0000000000000004 RDI: ffffffffeb7ec3a1 [ 401.302362] RBP: fffffbfffd6fd874 R08: 0000000000000000 R09: fffffbfffd6fd874 [ 401.309629] R10: ffffffffeb7ec3a4 R11: 0000000000000000 R12: ffffffffeb7ec3a1 [ 401.316898] R13: 0000000000000004 R14: fffffbfffd6fd874 R15: ffff88805372c718 [ 401.324164] FS: 0000000001d11940(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 401.332411] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 401.338287] CR2: fffffbfffd6fd874 CR3: 00000000b01ec000 CR4: 00000000001406e0 [ 401.345560] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 401.352823] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 401.360088] Call Trace: [ 401.362675] dqput.part.0+0xae/0x830 [ 401.366393] __dquot_drop+0x19c/0x270 [ 401.370198] ? dquot_scan_active+0x310/0x310 [ 401.374609] ? mark_held_locks+0xa6/0xf0 [ 401.378735] ? _raw_spin_unlock_irq+0x24/0x80 [ 401.383230] dquot_drop+0x14b/0x1a0 [ 401.386862] ext4_clear_inode+0x31/0x1d0 [ 401.390927] ext4_evict_inode+0x25b/0x1780 [ 401.395166] ? ext4_journalled_write_end+0x1450/0x1450 [ 401.400445] ? ext4_journalled_write_end+0x1450/0x1450 [ 401.405736] evict+0x2ed/0x760 [ 401.408932] dispose_list+0x124/0x1f0 [ 401.412729] evict_inodes+0x341/0x430 [ 401.416527] ? dispose_list+0x1f0/0x1f0 [ 401.420502] ? filemap_write_and_wait+0x90/0xd0 [ 401.425233] ? __sync_blockdev+0x7c/0xd0 [ 401.429301] generic_shutdown_super+0xb3/0x370 [ 401.433884] kill_block_super+0x97/0xf0 [ 401.437856] deactivate_locked_super+0x94/0x160 [ 401.442526] deactivate_super+0x174/0x1a0 [ 401.446675] ? deactivate_locked_super+0x160/0x160 [ 401.451606] ? dput+0x31/0x640 [ 401.454798] cleanup_mnt+0x1a8/0x290 [ 401.458591] task_work_run+0x148/0x1c0 [ 401.462481] exit_to_usermode_loop+0x251/0x2a0 [ 401.467067] do_syscall_64+0x538/0x620 [ 401.470963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.476149] RIP: 0033:0x4608e7 [ 401.479339] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 401.498363] RSP: 002b:00007ffc1d510008 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 401.506070] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000004608e7 [ 401.513337] RDX: 00000000004031f8 RSI: 0000000000000002 RDI: 00007ffc1d5100b0 [ 401.520602] RBP: 0000000000000822 R08: 0000000000000000 R09: 000000000000000c [ 401.527869] R10: 0000000000000005 R11: 0000000000000246 R12: 00007ffc1d511140 [ 401.535135] R13: 0000000001d12a60 R14: 0000000000000000 R15: 00007ffc1d511140 [ 401.542403] Modules linked in: [ 401.545593] CR2: fffffbfffd6fd874 [ 401.549048] ---[ end trace 352e13b1b46ef453 ]--- [ 401.553811] RIP: 0010:check_memory_region+0xc8/0x170 [ 401.558910] Code: 39 d0 74 0e 80 38 00 74 f2 48 85 c0 0f 85 9c 00 00 00 5b 5d 41 5c c3 48 85 d2 74 f6 48 01 ea eb 09 48 83 c0 01 48 39 d0 74 e8 <80> 38 00 74 f2 eb d8 41 bc 08 00 00 00 48 89 ea 45 29 dc 4e 8d 5c [ 401.577809] RSP: 0018:ffff888095da79c0 EFLAGS: 00010282 [ 401.583173] RAX: fffffbfffd6fd874 RBX: fffffbfffd6fd875 RCX: ffffffff81c1032e [ 401.590440] RDX: fffffbfffd6fd875 RSI: 0000000000000004 RDI: ffffffffeb7ec3a1 [ 401.597714] RBP: fffffbfffd6fd874 R08: 0000000000000000 R09: fffffbfffd6fd874 [ 401.604987] R10: ffffffffeb7ec3a4 R11: 0000000000000000 R12: ffffffffeb7ec3a1 [ 401.612255] R13: 0000000000000004 R14: fffffbfffd6fd874 R15: ffff88805372c718 [ 401.619527] FS: 0000000001d11940(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 401.627747] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 401.633627] CR2: fffffbfffd6fd874 CR3: 00000000b01ec000 CR4: 00000000001406e0 [ 401.640896] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 401.648161] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 401.655424] Kernel panic - not syncing: Fatal exception [ 401.661442] Kernel Offset: disabled [ 401.665059] Rebooting in 86400 seconds..