917d365ba257a221c9262ad8748d849df4dbb77031358234375a62a74c73597109c22ed8f74a17b988f442797924b7501b50ad6b0007f93d2bb7b1184f94cf82afacc430952b50a193d3eecd7733a1af01b7983225923664ec0d3cd9f6c4ca227599e589c5478707c379291d7f89f32f4b77ee83334b348227e36bfdb11e1b4d0e3f86e7b2711d31c4ba822687138d3c5c12a9bc2acab37418122eadf728dd5b6cd3455d6f69d905c8169030c635b89a0acf22608938e9d3a62212d1426d10bcd582373ec828d1ee52c666829ab050befbe36064b7ff2c0c2a4c831cb12dc4b751f489098b2a79fb51def97eecbe69135136d8882865e8fa57f75eed76511a3dca47c1c3771931dbb2f0f30db01236186758b215a39d853a5b68e61df5d69a36f44e50c870097daf785c8bf8a9013eb7231eb517987465151ae038edeb19ddde220830467d3c881da8bf509a4e110cfd1b5537801acc34e75d77f81f850f5a3bbcb4824d4c888bea4fb2b07d34fc252ae083e10a635dbc0f8d36e77d28fa830a6cdd35dea77cabc834f3a38eb8636a0ed12f9a3d329e4b0ee0aba967b17c3882c4c0778f0298f423885411159438054a04bed48f2907e4a43889b385a2f876d0c45e59edf986f7cacdf53d04fb5df89b9e6637e870afc370303d4950316fa32b78896c74f5a86201d3d684101d541c36b1910c994107d1e488ee7b4ea6526844a68d6e8d8866ac8d9b8b3d3b04e7611cf7136355210fe86038540bdea1e13eed9b66443f17dda83dbd754d98edccc5317ba78b724b0d2d30e704684b46133b42cb34fe05e42e79b477abd27ce052f3d5e7b144defe42616827d67bc0b09e749d7b51b0dad8bcedfd0d874f6cac09ac4f177325b382cfbcc244b159fdf08d6d2eec0e5bd8557b164404d0af60a2e04a9f5a1a4836e5a0b9d780e50bf22388e519bb965f2f688240dee2ce79219b532c3a395cf29d2238fde031c52d07da5f5b7ae3e9479ad7b10ea71e62a6320f9627c147b3e18d382e081eae39f3ee2317aa06db244de9598de1882bb264d163beab003d2146963fa81c7a1302847b39fbaf890af7ef7c031b0d9afa181f41835fec7213c9edf7c5713a52b0ae5d7fa815a3369f2f512b7ef2fd3a269ed7a68ef29f3ad1fccbfb3f43ead28a4192fec5b284172604b0169dc5087f0ee083540ab0268c79a3bc266bcc29d0abd69848cdfa8fbe1ca875bcf72f1e14591ae42cd3e6b7dbf52e6754785df64866f4a445434640a19d673c95bd007f351ed0aa03fe2e45914da226f44dba9031253cbd9b7a7fbe6da88a60c6736ebe6197d08059042f86006ff21679fb9c699e56daedfe30f58ee9efbbaa3e25ad224c92e1426104ff893bfec5f3abf793c19cde05e0cf2c92a0939f7d918909e3f63d1251c8ab528d257c3676618088a49cc133d519154e9b4070c0b5b1482e33cca4cf251818b43e45b347de871983e7c04623ae9ec23afa2fb1d06db6e77dbd3c0747edb358dca0b0429dd617c2db41632d7770ee0815321d17c43d70c0a3a144bea90f51af52e2e935a9339ef21e6fa9906d892e29a772f4cd19e730448d1759c45ce9119d2f2f1687d280fd97cbe090", 0x5af}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:36 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000000180), 0x5, &(0x7f0000000500)) 14:26:36 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff00140001007300"/93], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:36 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5af}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:36 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 566.841985] qnx4: unable to read the superblock 14:26:36 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5c6}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:36 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:36 executing program 1: syz_mount_image$qnx4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000000600)) 14:26:36 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:36 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5c6}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:36 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 567.048981] ufs: You didn't specify the type of your ufs filesystem [ 567.048981] [ 567.048981] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 567.048981] [ 567.048981] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 14:26:36 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:36 executing program 1: syz_mount_image$qnx4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000000600)) 14:26:37 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000000180), 0x5, &(0x7f0000000500)) 14:26:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5c6}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:37 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:37 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff00140001007300000000000000000000000000000008000400"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:37 executing program 1: syz_mount_image$qnx4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000000600)) 14:26:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5d2}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="2c4424309602b4ca5db215f3e8c07d1afd615843aa72a0b926d1ecdf98113b80246b9498e935c2772e99a68abbe9370896bbe32430b79826990cb2cbb51962f8b3ebc6a2405a06605fbe0e4825da97748786736d530b7bfa163d91beef24486094b2ccbf22bab24cf384205ab74becd9f1aee6efe48af525f4876365e6456e2970143bffe6e641dd6ca951004acc987aca33c19cf57131401829538aca98fcbee1f94f1af12a1b8a8be191b4b032e79a9f41eb83eaafd5f2dab98d881390f162d5c7ab378d00a2ef72f93f1810387ca76a8d9d9c542865a9da933c37b4ff3e46a5a13445dc17701001ba481c945d97ce2e5ca11aeb93302cb782ffec8d013a0ab8831ae4b1d0d6ef9744b33d22829d24b3378b0cc04e6939041310e050cc95044e6290f143f366d9f7088f3caeb7c524df0a2ebb70155062917d365ba257a221c9262ad8748d849df4dbb77031358234375a62a74c73597109c22ed8f74a17b988f442797924b7501b50ad6b0007f93d2bb7b1184f94cf82afacc430952b50a193d3eecd7733a1af01b7983225923664ec0d3cd9f6c4ca227599e589c5478707c379291d7f89f32f4b77ee83334b348227e36bfdb11e1b4d0e3f86e7b2711d31c4ba822687138d3c5c12a9bc2acab37418122eadf728dd5b6cd3455d6f69d905c8169030c635b89a0acf22608938e9d3a62212d1426d10bcd582373ec828d1ee52c666829ab050befbe36064b7ff2c0c2a4c831cb12dc4b751f489098b2a79fb51def97eecbe69135136d8882865e8fa57f75eed76511a3dca47c1c3771931dbb2f0f30db01236186758b215a39d853a5b68e61df5d69a36f44e50c870097daf785c8bf8a9013eb7231eb517987465151ae038edeb19ddde220830467d3c881da8bf509a4e110cfd1b5537801acc34e75d77f81f850f5a3bbcb4824d4c888bea4fb2b07d34fc252ae083e10a635dbc0f8d36e77d28fa830a6cdd35dea77cabc834f3a38eb8636a0ed12f9a3d329e4b0ee0aba967b17c3882c4c0778f0298f423885411159438054a04bed48f2907e4a43889b385a2f876d0c45e59edf986f7cacdf53d04fb5df89b9e6637e870afc370303d4950316fa32b78896c74f5a86201d3d684101d541c36b1910c994107d1e488ee7b4ea6526844a68d6e8d8866ac8d9b8b3d3b04e7611cf7136355210fe86038540bdea1e13eed9b66443f17dda83dbd754d98edccc5317ba78b724b0d2d30e704684b46133b42cb34fe05e42e79b477abd27ce052f3d5e7b144defe42616827d67bc0b09e749d7b51b0dad8bcedfd0d874f6cac09ac4f177325b382cfbcc244b159fdf08d6d2eec0e5bd8557b164404d0af60a2e04a9f5a1a4836e5a0b9d780e50bf22388e519bb965f2f688240dee2ce79219b532c3a395cf29d2238fde031c52d07da5f5b7ae3e9479ad7b10ea71e62a6320f9627c147b3e18d382e081eae39f3ee2317aa06db244de9598de1882bb264d163beab003d2146963fa81c7a1302847b39fbaf890af7ef7c031b0d9afa181f41835fec7213c9edf7c5713a52b0ae5d7fa815a3369f2f512b7ef2fd3a269ed7a68ef29f3ad1fccbfb3f43ead28a4192fec5b284172604b0169dc5087f0ee083540ab0268c79a3bc266bcc29d0abd69848cdfa8fbe1ca875bcf72f1e14591ae42cd3e6b7dbf52e6754785df64866f4a445434640a19d673c95bd007f351ed0aa03fe2e45914da226f44dba9031253cbd9b7a7fbe6da88a60c6736ebe6197d08059042f86006ff21679fb9c699e56daedfe30f58ee9efbbaa3e25ad224c92e1426104ff893bfec5f3abf793c19cde05e0cf2c92a0939f7d918909e3f63d1251c8ab528d257c3676618088a49cc133d519154e9b4070c0b5b1482e33cca4cf251818b43e45b347de871983e7c04623ae9ec23afa2fb1d06db6e77dbd3c0747edb358dca0b0429dd617c2db41632d7770ee0815321d17c43d70c0a3a144bea90f51af52e2e935a9339ef21e6fa9906d892e29a772f4cd19e730448d1759c45ce9119d2f2f1687d280fd97cbe090566965f9850d11d452423a6d7e32209bb4beb38c92110978bb4828da87a3ea30663986", 0x5d2}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) [ 567.518836] ufs: You didn't specify the type of your ufs filesystem [ 567.518836] [ 567.518836] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 567.518836] [ 567.518836] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 14:26:37 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff00140001007300000000000000000000000000000008000400"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5d2}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) [ 567.693635] validate_nla: 19 callbacks suppressed [ 567.693646] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 14:26:37 executing program 5: syz_mount_image$ufs(0x0, &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000000180), 0x5, &(0x7f0000000500)) 14:26:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="2c4424309602b4ca5db215f3e8c07d1afd615843aa72a0b926d1ecdf98113b80246b9498e935c2772e99a68abbe9370896bbe32430b79826990cb2cbb51962f8b3ebc6a2405a06605fbe0e4825da97748786736d530b7bfa163d91beef24486094b2ccbf22bab24cf384205ab74becd9f1aee6efe48af525f4876365e6456e2970143bffe6e641dd6ca951004acc987aca33c19cf57131401829538aca98fcbee1f94f1af12a1b8a8be191b4b032e79a9f41eb83eaafd5f2dab98d881390f162d5c7ab378d00a2ef72f93f1810387ca76a8d9d9c542865a9da933c37b4ff3e46a5a13445dc17701001ba481c945d97ce2e5ca11aeb93302cb782ffec8d013a0ab8831ae4b1d0d6ef9744b33d22829d24b3378b0cc04e6939041310e050cc95044e6290f143f366d9f7088f3caeb7c524df0a2ebb70155062917d365ba257a221c9262ad8748d849df4dbb77031358234375a62a74c73597109c22ed8f74a17b988f442797924b7501b50ad6b0007f93d2bb7b1184f94cf82afacc430952b50a193d3eecd7733a1af01b7983225923664ec0d3cd9f6c4ca227599e589c5478707c379291d7f89f32f4b77ee83334b348227e36bfdb11e1b4d0e3f86e7b2711d31c4ba822687138d3c5c12a9bc2acab37418122eadf728dd5b6cd3455d6f69d905c8169030c635b89a0acf22608938e9d3a62212d1426d10bcd582373ec828d1ee52c666829ab050befbe36064b7ff2c0c2a4c831cb12dc4b751f489098b2a79fb51def97eecbe69135136d8882865e8fa57f75eed76511a3dca47c1c3771931dbb2f0f30db01236186758b215a39d853a5b68e61df5d69a36f44e50c870097daf785c8bf8a9013eb7231eb517987465151ae038edeb19ddde220830467d3c881da8bf509a4e110cfd1b5537801acc34e75d77f81f850f5a3bbcb4824d4c888bea4fb2b07d34fc252ae083e10a635dbc0f8d36e77d28fa830a6cdd35dea77cabc834f3a38eb8636a0ed12f9a3d329e4b0ee0aba967b17c3882c4c0778f0298f423885411159438054a04bed48f2907e4a43889b385a2f876d0c45e59edf986f7cacdf53d04fb5df89b9e6637e870afc370303d4950316fa32b78896c74f5a86201d3d684101d541c36b1910c994107d1e488ee7b4ea6526844a68d6e8d8866ac8d9b8b3d3b04e7611cf7136355210fe86038540bdea1e13eed9b66443f17dda83dbd754d98edccc5317ba78b724b0d2d30e704684b46133b42cb34fe05e42e79b477abd27ce052f3d5e7b144defe42616827d67bc0b09e749d7b51b0dad8bcedfd0d874f6cac09ac4f177325b382cfbcc244b159fdf08d6d2eec0e5bd8557b164404d0af60a2e04a9f5a1a4836e5a0b9d780e50bf22388e519bb965f2f688240dee2ce79219b532c3a395cf29d2238fde031c52d07da5f5b7ae3e9479ad7b10ea71e62a6320f9627c147b3e18d382e081eae39f3ee2317aa06db244de9598de1882bb264d163beab003d2146963fa81c7a1302847b39fbaf890af7ef7c031b0d9afa181f41835fec7213c9edf7c5713a52b0ae5d7fa815a3369f2f512b7ef2fd3a269ed7a68ef29f3ad1fccbfb3f43ead28a4192fec5b284172604b0169dc5087f0ee083540ab0268c79a3bc266bcc29d0abd69848cdfa8fbe1ca875bcf72f1e14591ae42cd3e6b7dbf52e6754785df64866f4a445434640a19d673c95bd007f351ed0aa03fe2e45914da226f44dba9031253cbd9b7a7fbe6da88a60c6736ebe6197d08059042f86006ff21679fb9c699e56daedfe30f58ee9efbbaa3e25ad224c92e1426104ff893bfec5f3abf793c19cde05e0cf2c92a0939f7d918909e3f63d1251c8ab528d257c3676618088a49cc133d519154e9b4070c0b5b1482e33cca4cf251818b43e45b347de871983e7c04623ae9ec23afa2fb1d06db6e77dbd3c0747edb358dca0b0429dd617c2db41632d7770ee0815321d17c43d70c0a3a144bea90f51af52e2e935a9339ef21e6fa9906d892e29a772f4cd19e730448d1759c45ce9119d2f2f1687d280fd97cbe090566965f9850d11d452423a6d7e32209bb4beb38c92110978bb4828da87a3ea306639861cf116397110", 0x5d8}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5d8}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:37 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:37 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', 0x0, 0x0, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000000600)) 14:26:37 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff00140001007300000000000000000000000000000008000400"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5d8}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5db}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:37 executing program 5: syz_mount_image$ufs(0x0, &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000000180), 0x5, &(0x7f0000000500)) [ 567.993076] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 568.032855] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 14:26:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5db}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:37 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 568.032855] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 568.032855] 14:26:37 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', 0x0, 0x0, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000000600)) 14:26:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5db}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:37 executing program 5: syz_mount_image$ufs(0x0, &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000000180), 0x5, &(0x7f0000000500)) [ 568.122215] EXT4-fs (loop0): bad geometry: block count 64 exceeds size of device (8 blocks) [ 568.188933] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 568.221670] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 14:26:38 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:38 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dc}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:38 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:38 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dc}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) 14:26:38 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', 0x0, 0x300, 0x0, &(0x7f0000000180), 0x5, &(0x7f0000000500)) 14:26:38 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', 0x0, 0x0, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x101}], 0x0, &(0x7f0000000600)) 14:26:38 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dc}], 0x1, &(0x7f00000004c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x2, 0x0) [ 568.395771] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 568.403767] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 568.452994] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 568.452994] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 568.452994] 14:26:38 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 568.509496] EXT4-fs (loop0): bad geometry: block count 64 exceeds size of device (8 blocks) 14:26:38 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)) [ 568.589494] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 14:26:38 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="2c4424309602b4ca5db215f3e8c07d1afd615843aa72a0b926d1ecdf98113b80246b9498e935c2772e99a68abbe9370896bbe32430b79826990cb2cbb51962f8b3ebc6a2405a06605fbe0e4825da97748786736d530b7bfa163d91beef24486094b2ccbf22bab24cf384205ab74becd9f1aee6efe48af525f4876365e6456e2970143bffe6e641dd6ca951004acc987aca33c19cf57131401829538aca98fcbee1f94f1af12a1b8a8be191b4b032e79a9f41eb83eaafd5f2dab98d881390f162d5c7ab378d00a2ef72f93f1810387ca76a8d9d9c542865a9da933c37b4ff3e46a5a13445dc17701001ba481c945d97ce2e5ca11aeb93302cb782ffec8d013a0ab8831ae4b1d0d6ef9744b33d22829d24b3378b0cc04e6939041310e050cc95044e6290f143f366d9f7088f3caeb7c524df0a2ebb70155062917d365ba257a221c9262ad8748d849df4dbb77031358234375a62a74c73597109c22ed8f74a17b988f442797924b7501b50ad6b0007f93d2bb7b1184f94cf82afacc430952b50a193d3eecd7733a1af01b7983225923664ec0d3cd9f6c4ca227599e589c5478707c379291d7f89f32f4b77ee83334b348227e36bfdb11e1b4d0e3f86e7b2711d31c4ba822687138d3c5c12a9bc2acab37418122eadf728dd5b6cd3455d6f69d905c8169030c635b89a0acf22608938e9d3a62212d1426d10bcd582373ec828d1ee52c666829ab050befbe36064b7ff2c0c2a4c831cb12dc4b751f489098b2a79fb51def97eecbe69135136d8882865e8fa57f75eed76511a3dca47c1c3771931dbb2f0f30db01236186758b215a39d853a5b68e61df5d69a36f44e50c870097daf785c8bf8a9013eb7231eb517987465151ae038edeb19ddde220830467d3c881da8bf509a4e110cfd1b5537801acc34e75d77f81f850f5a3bbcb4824d4c888bea4fb2b07d34fc252ae083e10a635dbc0f8d36e77d28fa830a6cdd35dea77cabc834f3a38eb8636a0ed12f9a3d329e4b0ee0aba967b17c3882c4c0778f0298f423885411159438054a04bed48f2907e4a43889b385a2f876d0c45e59edf986f7cacdf53d04fb5df89b9e6637e870afc370303d4950316fa32b78896c74f5a86201d3d684101d541c36b1910c994107d1e488ee7b4ea6526844a68d6e8d8866ac8d9b8b3d3b04e7611cf7136355210fe86038540bdea1e13eed9b66443f17dda83dbd754d98edccc5317ba78b724b0d2d30e704684b46133b42cb34fe05e42e79b477abd27ce052f3d5e7b144defe42616827d67bc0b09e749d7b51b0dad8bcedfd0d874f6cac09ac4f177325b382cfbcc244b159fdf08d6d2eec0e5bd8557b164404d0af60a2e04a9f5a1a4836e5a0b9d780e50bf22388e519bb965f2f688240dee2ce79219b532c3a395cf29d2238fde031c52d07da5f5b7ae3e9479ad7b10ea71e62a6320f9627c147b3e18d382e081eae39f3ee2317aa06db244de9598de1882bb264d163beab003d2146963fa81c7a1302847b39fbaf890af7ef7c031b0d9afa181f41835fec7213c9edf7c5713a52b0ae5d7fa815a3369f2f512b7ef2fd3a269ed7a68ef29f3ad1fccbfb3f43ead28a4192fec5b284172604b0169dc5087f0ee083540ab0268c79a3bc266bcc29d0abd69848cdfa8fbe1ca875bcf72f1e14591ae42cd3e6b7dbf52e6754785df64866f4a445434640a19d673c95bd007f351ed0aa03fe2e45914da226f44dba9031253cbd9b7a7fbe6da88a60c6736ebe6197d08059042f86006ff21679fb9c699e56daedfe30f58ee9efbbaa3e25ad224c92e1426104ff893bfec5f3abf793c19cde05e0cf2c92a0939f7d918909e3f63d1251c8ab528d257c3676618088a49cc133d519154e9b4070c0b5b1482e33cca4cf251818b43e45b347de871983e7c04623ae9ec23afa2fb1d06db6e77dbd3c0747edb358dca0b0429dd617c2db41632d7770ee0815321d17c43d70c0a3a144bea90f51af52e2e935a9339ef21e6fa9906d892e29a772f4cd19e730448d1759c45ce9119d2f2f1687d280fd97cbe090566965f9850d11d452423a6d7e32209bb4beb38c92110978bb4828da87a3ea306639861cf116397110c54ba80a23", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:38 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:38 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', 0x0, 0x300, 0x0, &(0x7f0000000180), 0x5, &(0x7f0000000500)) 14:26:38 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 568.633363] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 14:26:38 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x1, 0x0) 14:26:38 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)) [ 568.741173] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 568.741173] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 568.741173] [ 568.791314] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 568.802770] nla_parse: 14 callbacks suppressed [ 568.802787] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.4'. [ 568.831436] EXT4-fs (loop0): bad geometry: block count 64 exceeds size of device (8 blocks) 14:26:38 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x1, 0x0) 14:26:38 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', 0x0, 0x300, 0x0, &(0x7f0000000180), 0x5, &(0x7f0000000500)) 14:26:38 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)) 14:26:38 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:38 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x1, 0x0) 14:26:38 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x5, &(0x7f0000000500)) [ 569.029442] netlink: 'syz-executor.4': attribute type 1 has an invalid length. [ 569.068881] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:38 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:38 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000600)) 14:26:38 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 569.108139] ufs: You didn't specify the type of your ufs filesystem [ 569.108139] [ 569.108139] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 569.108139] [ 569.108139] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 14:26:38 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 569.204611] ufs: ufs_fill_super(): bad magic number [ 569.222340] qnx4: no qnx4 filesystem (no root dir). [ 569.229048] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:39 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x5, &(0x7f0000000500)) 14:26:39 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:39 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:39 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000600)) 14:26:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 569.440151] ufs: You didn't specify the type of your ufs filesystem [ 569.440151] [ 569.440151] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 569.440151] [ 569.440151] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 569.450274] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:39 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a0a", 0x14}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) [ 569.507609] qnx4: no qnx4 filesystem (no root dir). [ 569.564459] ufs: ufs_fill_super(): bad magic number 14:26:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:39 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000", 0x15}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:39 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000600)) 14:26:39 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:39 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x5, &(0x7f0000000500)) 14:26:39 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) [ 569.695659] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 569.695659] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 569.695659] 14:26:39 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) [ 569.768323] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 569.780236] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.4'. [ 569.790596] ufs: You didn't specify the type of your ufs filesystem [ 569.790596] [ 569.790596] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 569.790596] [ 569.790596] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 569.832383] qnx4: no qnx4 filesystem (no root dir). 14:26:39 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 569.872164] EXT4-fs (loop0): get root inode failed [ 569.889792] EXT4-fs (loop0): mount failed 14:26:39 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{0x0}], 0x0, &(0x7f0000000600)) [ 569.917943] ufs: ufs_fill_super(): bad magic number 14:26:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:39 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="2c4424309602b4ca5db215f3e8c07d1afd615843aa72a0b926d1ecdf98113b80246b9498e935c2772e99a68abbe9370896bbe32430b79826990cb2cbb51962f8b3ebc6a2405a06605fbe0e4825da97748786736d530b7bfa163d91beef24486094b2ccbf22bab24cf384205ab74becd9f1aee6efe48af525f4876365e6456e2970143bffe6e641dd6ca951004acc987aca33c19cf57131401829538aca98fcbee1f94f1af12a1b8a8be191b4b032e79a9f41eb83eaafd5f2dab98d881390f162d5c7ab378d00a2ef72f93f1810387ca76a8d9d9c542865a9da933c37b4ff3e46a5a13445dc17701001ba481c945d97ce2e5ca11aeb93302cb782ffec8d013a0ab8831ae4b1d0d6ef9744b33d22829d24b3378b0cc04e6939041310e050cc95044e6290f143f366d9f7088f3caeb7c524df0a2ebb70155062917d365ba257a221c9262ad8748d849df4dbb77031358234375a62a74c73597109c22ed8f74a17b988f442797924b7501b50ad6b0007f93d2bb7b1184f94cf82afacc430952b50a193d3eecd7733a1af01b7983225923664ec0d3cd9f6c4ca227599e589c5478707c379291d7f89f32f4b77ee83334b348227e36bfdb11e1b4d0e3f86e7b2711d31c4ba822687138d3c5c12a9bc2acab37418122eadf728dd5b6cd3455d6f69d905c8169030c635b89a0acf22608938e9d3a62212d1426d10bcd582373ec828d1ee52c666829ab050befbe36064b7ff2c0c2a4c831cb12dc4b751f489098b2a79fb51def97eecbe69135136d8882865e8fa57f75eed76511a3dca47c1c3771931dbb2f0f30db01236186758b215a39d853a5b68e61df5d69a36f44e50c870097daf785c8bf8a9013eb7231eb517987465151ae038edeb19ddde220830467d3c881da8bf509a4e110cfd1b5537801acc34e75d77f81f850f5a3bbcb4824d4c888bea4fb2b07d34fc252ae083e10a635dbc0f8d36e77d28fa830a6cdd35dea77cabc834f3a38eb8636a0ed12f9a3d329e4b0ee0aba967b17c3882c4c0778f0298f423885411159438054a04bed48f2907e4a43889b385a2f876d0c45e59edf986f7cacdf53d04fb5df89b9e6637e870afc370303d4950316fa32b78896c74f5a86201d3d684101d541c36b1910c994107d1e488ee7b4ea6526844a68d6e8d8866ac8d9b8b3d3b04e7611cf7136355210fe86038540bdea1e13eed9b66443f17dda83dbd754d98edccc5317ba78b724b0d2d30e704684b46133b42cb34fe05e42e79b477abd27ce052f3d5e7b144defe42616827d67bc0b09e749d7b51b0dad8bcedfd0d874f6cac09ac4f177325b382cfbcc244b159fdf08d6d2eec0e5bd8557b164404d0af60a2e04a9f5a1a4836e5a0b9d780e50bf22388e519bb965f2f688240dee2ce79219b532c3a395cf29d2238fde031c52d07da5f5b7ae3e9479ad7b10ea71e62a6320f9627c147b3e18d382e081eae39f3ee2317aa06db244de9598de1882bb264d163beab003d2146963fa81c7a1302847b39fbaf890af7ef7c031b0d9afa181f41835fec7213c9edf7c5713a52b0ae5d7fa815a3369f2f512b7ef2fd3a269ed7a68ef29f3ad1fccbfb3f43ead28a4192fec5b284172604b0169dc5087f0ee083540ab0268c79a3bc266bcc29d0abd69848cdfa8fbe1ca875bcf72f1e14591ae42cd3e6b7dbf52e6754785df64866f4a445434640a19d673c95bd007f351ed0aa03fe2e45914da226f44dba9031253cbd9b7a7fbe6da88a60c6736ebe6197d08059042f86006ff21679fb9c699e56daedfe30f58ee9efbbaa3e25ad224c92e1426104ff893bfec5f3abf793c19cde05e0cf2c92a0939f7d918909e3f63d1251c8ab528d257c3676618088a49cc133d519154e9b4070c0b5b1482e33cca4cf251818b43e45b347de871983e7c04623ae9ec23afa2fb1d06db6e77dbd3c0747edb358dca0b0429dd617c2db41632d7770ee0815321d17c43d70c0a3a144bea90f51af52e2e935a9339ef21e6fa9906d892e29a772f4cd19e730448d1759c45ce9119d2f2f1687d280fd97cbe090566965f9850d11d452423a6d7e32209bb4beb38c92110978bb4828da87a3ea306639861cf116397110c54ba80a23", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:39 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, 0x0, 0x5, &(0x7f0000000500)) [ 569.978686] netlink: 4608 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:39 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e80", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 570.058178] qnx4: no qnx4 filesystem (no root dir). 14:26:39 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000", 0x15}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:39 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:39 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{0x0}], 0x0, &(0x7f0000000600)) 14:26:39 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e80", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 570.135642] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 570.135642] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 570.135642] 14:26:40 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, 0x0, 0x5, &(0x7f0000000500)) 14:26:40 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) [ 570.241979] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated 14:26:40 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:40 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e80", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 570.303233] EXT4-fs (loop0): get root inode failed [ 570.309242] qnx4: no qnx4 filesystem (no root dir). [ 570.324477] EXT4-fs (loop0): mount failed 14:26:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:40 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{0x0}], 0x0, &(0x7f0000000600)) 14:26:40 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, 0x0, 0x5, &(0x7f0000000500)) 14:26:40 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e8000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:40 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000", 0x15}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:40 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{0x0}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:40 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000500)) [ 570.580389] qnx4: no qnx4 filesystem (no root dir). [ 570.593272] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 570.593272] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 570.593272] [ 570.610155] netlink: 3584 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:40 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x101}], 0x0, 0x0) 14:26:40 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e8000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 570.702732] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated 14:26:40 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{0x0}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) [ 570.745663] EXT4-fs (loop0): get root inode failed [ 570.762483] EXT4-fs (loop0): mount failed [ 570.777163] netlink: 3584 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:40 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e8000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {0x0, 0x0, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:40 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{0x0}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:40 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x101}], 0x0, 0x0) [ 570.870942] ufs: ufs was compiled with read-only support, can't be mounted as read-write 14:26:40 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d0006", 0x1f}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 570.917495] netlink: 3584 bytes leftover after parsing attributes in process `syz-executor.4'. 14:26:40 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:40 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:40 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000500)) 14:26:40 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) [ 571.018976] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 571.018976] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 571.018976] [ 571.115743] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 571.140013] ufs: ufs was compiled with read-only support, can't be mounted as read-write [ 571.149091] EXT4-fs (loop0): get root inode failed 14:26:40 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) [ 571.173131] EXT4-fs (loop0): mount failed 14:26:41 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:41 executing program 1: syz_mount_image$qnx4(&(0x7f0000000000)='qnx4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x101}], 0x0, 0x0) 14:26:41 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d", 0xa}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {0x0, 0x0, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:41 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000500)) 14:26:41 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d0006", 0x1f}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:41 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x0, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:41 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d", 0xa}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) [ 571.454384] ufs: ufs was compiled with read-only support, can't be mounted as read-write [ 571.481121] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 571.481121] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 571.481121] [ 571.505917] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated 14:26:41 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000000180), 0x5, 0x0) 14:26:41 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d", 0xa}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) [ 571.569964] EXT4-fs (loop0): get root inode failed [ 571.576049] EXT4-fs (loop0): mount failed 14:26:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {0x0, 0x0, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:41 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r1, 0x11, 0x2c070000, 0x4f010000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r2, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:26:41 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae", 0xf}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:41 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:41 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000000180), 0x5, 0x0) [ 571.794346] audit: type=1800 audit(1600612001.568:135): pid=26492 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=16239 res=0 [ 571.830384] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 571.830384] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 571.830384] 14:26:41 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae", 0xf}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:41 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d0006", 0x1f}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:41 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:41 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r1, 0x11, 0x2c070000, 0x4f010000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r2, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) [ 571.925372] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 571.941850] EXT4-fs (loop0): get root inode failed [ 571.947079] EXT4-fs (loop0): mount failed 14:26:41 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500), 0x0, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:41 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae", 0xf}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:41 executing program 5: syz_mount_image$ufs(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x300, 0x0, &(0x7f0000000180), 0x5, 0x0) 14:26:41 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d", 0x12}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:41 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 572.143834] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 572.143834] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 572.143834] [ 572.176930] audit: type=1800 audit(1600612001.948:136): pid=26525 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=16229 res=0 14:26:42 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d", 0x12}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) [ 572.262777] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 572.309341] EXT4-fs (loop0): get root inode failed 14:26:42 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) [ 572.356435] EXT4-fs (loop0): mount failed 14:26:42 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d", 0x12}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:42 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea110000", 0x24}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:42 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441f9", 0xfcae) 14:26:42 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r1, 0x11, 0x2c070000, 0x4f010000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r2, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:26:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500), 0x0, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:42 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r1, 0x11, 0x2c070000, 0x4f010000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r2, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:26:42 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a", 0x13}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="2c4424309602b4ca5db215f3e8c07d1afd615843aa72a0b926d1ecdf98113b80246b9498e935c2772e99a68abbe9370896bbe32430b79826990cb2cbb51962f8b3ebc6a2405a06605fbe0e4825da97748786736d530b7bfa163d91beef24486094b2ccbf22bab24cf384205ab74becd9f1aee6efe48af525f4876365e6456e2970143bffe6e641dd6ca951004acc987aca33c19cf57131401829538aca98fcbee1f94f1af12a1b8a8be191b4b032e79a9f41eb83eaafd5f2dab98d881390f162d5c7ab378d00a2ef72f93f1810387ca76a8d9d9c542865a9da933c37b4ff3e46a5a13445dc17701001ba481c945d97ce2e5ca11aeb93302cb782ffec8d013a0ab8831ae4b1d0d6ef9744b33d22829d24b3378b0cc04e6939041310e050cc95044e6290f143f366d9f7088f3caeb7c524df0a2ebb70155062917d365ba257a221c9262ad8748d849df4dbb77031358234375a62a74c73597109c22ed8f74a17b988f442797924b7501b50ad6b0007f93d2bb7b1184f94cf82afacc430952b50a193d3eecd7733a1af01b7983225923664ec0d3cd9f6c4ca227599e589c5478707c379291d7f89f32f4b77ee83334b348227e36bfdb11e1b4d0e3f86e7b2711d31c4ba822687138d3c5c12a9bc2acab37418122eadf728dd5b6cd3455d6f69d905c8169030c635b89a0acf22608938e9d3a62212d1426d10bcd582373ec828d1ee52c666829ab050befbe36064b7ff2c0c2a4c831cb12dc4b751f489098b2a79fb51def97eecbe69135136d8882865e8fa57f75eed76511a3dca47c1c3771931dbb2f0f30db01236186758b215a39d853a5b68e61df5d69a36f44e50c870097daf785c8bf8a9013eb7231eb517987465151ae038edeb19ddde220830467d3c881da8bf509a4e110cfd1b5537801acc34e75d77f81f850f5a3bbcb4824d4c888bea4fb2b07d34fc252ae083e10a635dbc0f8d36e77d28fa830a6cdd35dea77cabc834f3a38eb8636a0ed12f9a3d329e4b0ee0aba967b17c3882c4c0778f0298f423885411159438054a04bed48f2907e4a43889b385a2f876d0c45e59edf986f7cacdf53d04fb5df89b9e6637e870afc370303d4950316fa32b78896c74f5a86201d3d684101d541c36b1910c994107d1e488ee7b4ea6526844a68d6e8d8866ac8d9b8b3d3b04e7611cf7136355210fe86038540bdea1e13eed9b66443f17dda83dbd754d98edccc5317ba78b724b0d2d30e704684b46133b42cb34fe05e42e79b477abd27ce052f3d5e7b144defe42616827d67bc0b09e749d7b51b0dad8bcedfd0d874f6cac09ac4f177325b382cfbcc244b159fdf08d6d2eec0e5bd8557b164404d0af60a2e04a9f5a1a4836e5a0b9d780e50bf22388e519bb965f2f688240dee2ce79219b532c3a395cf29d2238fde031c52d07da5f5b7ae3e9479ad7b10ea71e62a6320f9627c147b3e18d382e081eae39f3ee2317aa06db244de9598de1882bb264d163beab003d2146963fa81c7a1302847b39fbaf890af7ef7c031b0d9afa181f41835fec7213c9edf7c5713a52b0ae5d7fa815a3369f2f512b7ef2fd3a269ed7a68ef29f3ad1fccbfb3f43ead28a4192fec5b284172604b0169dc5087f0ee083540ab0268c79a3bc266bcc29d0abd69848cdfa8fbe1ca875bcf72f1e14591ae42cd3e6b7dbf52e6754785df64866f4a445434640a19d673c95bd007f351ed0aa03fe2e45914da226f44dba9031253cbd9b7a7fbe6da88a60c6736ebe6197d08059042f86006ff21679fb9c699e56daedfe30f58ee9efbbaa3e25ad224c92e1426104ff893bfec5f3abf793c19cde05e0cf2c92a0939f7d918909e3f63d1251c8ab528d257c3676618088a49cc133d519154e9b4070c0b5b1482e33cca4cf251818b43e45b347de871983e7c04623ae9ec23afa2fb1d06db6e77dbd3c0747edb358dca0b0429dd617c2db41632d7770ee0815321d17c43d70c0a3a144bea90f51af52e2e935a9339ef21e6fa9906d892e29a772f4cd19e730448d1759c45ce9119d2f2f1687d280fd97cbe090566965f9850d11d452423a6d7e32209bb4beb38c92110978bb4828da87a3ea306639861cf116397110c54ba80a23", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:42 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) [ 572.574183] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 572.574183] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 572.574183] [ 572.593392] audit: type=1800 audit(1600612002.368:137): pid=26552 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=17507 res=0 [ 572.674589] audit: type=1800 audit(1600612002.408:138): pid=26559 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file2" dev="sda1" ino=16232 res=0 [ 572.704751] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated 14:26:42 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a", 0x13}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) [ 572.751335] EXT4-fs (loop0): get root inode failed [ 572.791158] EXT4-fs (loop0): mount failed 14:26:42 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 14:26:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500), 0x0, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:42 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000002f00)=[{{&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000080)="f10f8beae045f1deb98d8a925ce4ae719d4d6a", 0x13}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000002680)=[{&(0x7f0000000580)="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", 0x5dd}], 0x1}}], 0x2, 0x0) 14:26:42 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea110000", 0x24}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:42 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:42 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 14:26:42 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r1, 0x11, 0x2c070000, 0x4f010000) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r2, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) [ 573.054856] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 573.054856] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 573.054856] [ 573.074851] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 573.087138] EXT4-fs (loop0): get root inode failed [ 573.096356] EXT4-fs (loop0): mount failed 14:26:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c464", 0xf, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:43 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240), 0x0) 14:26:43 executing program 3: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000700)={[{@grpquota='grpquota'}]}) [ 573.283816] audit: type=1800 audit(1600612003.048:139): pid=26595 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=16228 res=0 14:26:43 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:43 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea110000", 0x24}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 573.366268] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 573.366268] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 573.366268] 14:26:43 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240), 0x0) 14:26:43 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 573.418664] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 573.474973] EXT4-fs (loop0): get root inode failed [ 573.513267] EXT4-fs (loop0): mount failed 14:26:43 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:43 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240), 0x0) 14:26:43 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:43 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r1, 0x11, 0x2c070000, 0x4f010000) pwritev(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:26:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c464", 0xf, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:43 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008", 0x1d) 14:26:43 executing program 3: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:43 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008", 0x1d) [ 573.795708] audit: type=1800 audit(1600612003.568:140): pid=26631 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=17533 res=0 [ 573.819259] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 573.819259] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 573.819259] 14:26:43 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 573.906161] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated 14:26:43 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea110000000500", 0x27}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:43 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:26:43 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008", 0x1d) [ 573.966961] EXT4-fs (loop0): get root inode failed [ 573.985378] EXT4-fs (loop0): mount failed 14:26:43 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r1, 0x11, 0x2c070000, 0x4f010000) pwritev(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:26:43 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498", 0x2c) 14:26:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c464", 0xf, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:43 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 574.141582] audit: type=1800 audit(1600612003.918:141): pid=26665 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=15768 res=0 14:26:44 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498", 0x2c) 14:26:44 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea110000000500", 0x27}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:44 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r1, 0x11, 0x2c070000, 0x4f010000) pwritev(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) [ 574.275395] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 574.275395] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 574.275395] 14:26:44 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498", 0x2c) 14:26:44 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 574.349428] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 574.385003] EXT4-fs (loop0): get root inode failed [ 574.415717] EXT4-fs (loop0): mount failed [ 574.438464] audit: type=1800 audit(1600612004.208:142): pid=26687 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=17536 res=0 14:26:44 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa", 0x33) 14:26:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:26:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c46407000000000000", 0x16, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:46 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:46 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa", 0x33) 14:26:46 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:26:46 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea110000000500", 0x27}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 577.088115] audit: type=1800 audit(1600612006.858:143): pid=26713 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=17547 res=0 [ 577.124318] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 577.124318] Contact linux-ext4@vger.kernel.org if you think we should keep it. 14:26:46 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:46 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa", 0x33) [ 577.124318] 14:26:46 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) [ 577.197978] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 577.218771] EXT4-fs (loop0): get root inode failed [ 577.224531] EXT4-fs (loop0): mount failed [ 577.260954] audit: type=1800 audit(1600612007.038:144): pid=26730 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=17552 res=0 14:26:47 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:47 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea11000000050000", 0x28}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:47 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2", 0x37) 14:26:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c46407000000000000", 0x16, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:26:49 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:26:49 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2", 0x37) 14:26:49 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:49 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea11000000050000", 0x28}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:49 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) [ 580.080398] audit: type=1800 audit(1600612009.859:145): pid=26752 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=15890 res=0 14:26:49 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2", 0x37) 14:26:50 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', 0x0, 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 580.193994] audit: type=1800 audit(1600612009.959:146): pid=26767 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=15937 res=0 [ 580.220486] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 580.220486] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 580.220486] 14:26:50 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441", 0x39) 14:26:50 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) [ 580.313372] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 580.352525] EXT4-fs (loop0): get root inode failed 14:26:50 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', 0x0, 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 580.366612] audit: type=1800 audit(1600612010.139:147): pid=26784 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=16050 res=0 [ 580.398940] EXT4-fs (loop0): mount failed 14:26:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c46407000000000000", 0x16, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 580.529159] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 580.529159] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 580.529159] [ 580.554445] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 580.574159] EXT4-fs (loop0): get root inode failed [ 580.580915] EXT4-fs (loop0): mount failed 14:26:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:26:52 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441", 0x39) 14:26:52 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) copy_file_range(r0, 0x0, r0, 0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:26:52 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea11000000050000", 0x28}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:52 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', 0x0, 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}, {&(0x7f0000010500)="2e202020202020202020201000c1e770325132510000e7703251f1ff000000002e2e20202020202020282010", 0x2c, 0x10e00}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700"/26, 0x1a, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:52 executing program 4: sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="6e800000", @ANYRES16, @ANYBLOB="000000000000000000000900010008002100000000004800028006000f000000000006000e0200000000080007000000000005000d0000000000060f0200000000000800040000f8ff0014000100730000000000000000000000000000000800040001"], 0x6c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="241400001a0025f00485bc04fef7001d020b49ff708800008011280008020100e0e00000bc71176a36ede498534108e58342fa94a235a2a441", 0x39) [ 583.140095] audit: type=1800 audit(1600612012.909:148): pid=26812 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=16262 res=0 14:26:53 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 583.201573] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 583.201573] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 583.201573] 14:26:53 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:26:53 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 583.288601] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated 14:26:53 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 583.334300] EXT4-fs (loop0): get root inode failed [ 583.346238] audit: type=1800 audit(1600612013.119:149): pid=26834 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=16242 res=0 [ 583.358258] EXT4-fs (loop0): mount failed 14:26:53 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:26:55 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 14:26:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700"/26, 0x1a, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:55 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:26:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) clock_gettime(0x1, &(0x7f0000000140)={0x0, 0x0}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000002380)={'filter\x00', 0x7, 0x4, 0x3c8, 0xe8, 0x0, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000180), {[{{@arp={@multicast2, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_1\x00', 'geneve0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'caif0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@arp={@private, @rand_addr, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'xfrm0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="28572d49b7f2", @mac=@link_local, @broadcast, @private, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) unlinkat(r6, &(0x7f0000000000)='./file0\x00', 0x0) r7 = dup(r4) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x4e22, @remote}, {0x2, 0x100, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1}) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {r2, r3/1000+10000}}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r8, &(0x7f00000017c0), 0x1a5, 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r8, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB="c0820000", @ANYRES16=r9, @ANYBLOB="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"], 0x194}, 0x1, 0x0, 0x0, 0x8100}, 0x41) syz_emit_ethernet(0x34, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaaaa00cc000000080045000026000000f1ff109078000000000000000000004e200012907800000000000000000000dff18de17bde47d9d9848120d153f9c740b8b9d262705ac5dc4618700833108978aed491f09b550e541436b0e2c491fd053f4b7b4d7b7441b2f7583bdb016e681659e0a446e2650b64f88d7ea2167d112b1a165f54b78d8a0756058ce5181cfedfe6c07841f405c405b40e46c825e57f491e6786b1e12edd0cafee74a7a90c470bd9b932916c0356084cb292c040b6fa92c6d5fb8ba8bdb00b6c0f306c19f4476d47281ef55e982f2217c62725bdcf2846219d6b704826bee13b14d975ae00"/257], 0x0) recvfrom(r0, &(0x7f00000000c0)=""/10, 0xa, 0x0, 0x0, 0x0) 14:26:55 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 586.197077] audit: type=1800 audit(1600612015.969:150): pid=26863 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=16482 res=0 [ 586.207094] FAT-fs (loop5): Directory bread(block 6) failed [ 586.236869] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 14:26:56 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 586.236869] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 586.236869] 14:26:56 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x443c2, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:26:56 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:56 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) socket(0x10, 0x80002, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 586.351545] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 586.365580] EXT4-fs (loop0): get root inode failed [ 586.370812] EXT4-fs (loop0): mount failed [ 586.375313] audit: type=1800 audit(1600612016.149:151): pid=26878 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file2" dev="sda1" ino=16290 res=0 14:26:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700"/26, 0x1a, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:56 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) [ 586.486775] FAT-fs (loop5): bogus number of reserved sectors [ 586.521760] FAT-fs (loop5): Can't find a valid FAT filesystem [ 586.553959] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 586.553959] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 586.553959] [ 586.584459] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 586.628272] EXT4-fs (loop0): get root inode failed [ 586.647435] EXT4-fs (loop0): mount failed 14:26:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:26:58 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 14:26:58 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:58 executing program 1: r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:26:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c46407000000000000000000000400", 0x1c, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:26:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) clock_gettime(0x1, &(0x7f0000000140)={0x0, 0x0}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000002380)={'filter\x00', 0x7, 0x4, 0x3c8, 0xe8, 0x0, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000180), {[{{@arp={@multicast2, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_1\x00', 'geneve0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'caif0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@arp={@private, @rand_addr, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'xfrm0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="28572d49b7f2", @mac=@link_local, @broadcast, @private, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) unlinkat(r6, &(0x7f0000000000)='./file0\x00', 0x0) r7 = dup(r4) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x4e22, @remote}, {0x2, 0x100, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1}) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {r2, r3/1000+10000}}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r8, &(0x7f00000017c0), 0x1a5, 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r8, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB="c0820000", @ANYRES16=r9, @ANYBLOB="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"], 0x194}, 0x1, 0x0, 0x0, 0x8100}, 0x41) syz_emit_ethernet(0x34, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaaaa00cc000000080045000026000000f1ff109078000000000000000000004e200012907800000000000000000000dff18de17bde47d9d9848120d153f9c740b8b9d262705ac5dc4618700833108978aed491f09b550e541436b0e2c491fd053f4b7b4d7b7441b2f7583bdb016e681659e0a446e2650b64f88d7ea2167d112b1a165f54b78d8a0756058ce5181cfedfe6c07841f405c405b40e46c825e57f491e6786b1e12edd0cafee74a7a90c470bd9b932916c0356084cb292c040b6fa92c6d5fb8ba8bdb00b6c0f306c19f4476d47281ef55e982f2217c62725bdcf2846219d6b704826bee13b14d975ae00"/257], 0x0) recvfrom(r0, &(0x7f00000000c0)=""/10, 0xa, 0x0, 0x0, 0x0) 14:26:59 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 14:26:59 executing program 1: r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) [ 589.253168] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 589.253168] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 589.253168] [ 589.275977] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 589.282474] EXT4-fs (loop0): mount failed [ 589.294690] FAT-fs (loop5): bogus number of reserved sectors 14:26:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c46407000000000000000000000400", 0x1c, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 589.330872] FAT-fs (loop5): Can't find a valid FAT filesystem 14:26:59 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 14:26:59 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:26:59 executing program 1: r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) [ 589.434067] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 589.434067] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 589.434067] [ 589.505672] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 589.513904] EXT4-fs (loop0): mount failed [ 589.524007] FAT-fs (loop5): bogus number of reserved sectors [ 589.531945] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:02 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x0, 0x0) 14:27:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c46407000000000000000000000400", 0x1c, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:02 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:02 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) clock_gettime(0x1, &(0x7f0000000140)={0x0, 0x0}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000002380)={'filter\x00', 0x7, 0x4, 0x3c8, 0xe8, 0x0, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000180), {[{{@arp={@multicast2, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_1\x00', 'geneve0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'caif0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@arp={@private, @rand_addr, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'xfrm0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="28572d49b7f2", @mac=@link_local, @broadcast, @private, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) unlinkat(r6, &(0x7f0000000000)='./file0\x00', 0x0) r7 = dup(r4) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x4e22, @remote}, {0x2, 0x100, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1}) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {r2, r3/1000+10000}}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r8, &(0x7f00000017c0), 0x1a5, 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r8, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB="c0820000", @ANYRES16=r9, @ANYBLOB="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"], 0x194}, 0x1, 0x0, 0x0, 0x8100}, 0x41) syz_emit_ethernet(0x34, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaaaa00cc000000080045000026000000f1ff109078000000000000000000004e200012907800000000000000000000dff18de17bde47d9d9848120d153f9c740b8b9d262705ac5dc4618700833108978aed491f09b550e541436b0e2c491fd053f4b7b4d7b7441b2f7583bdb016e681659e0a446e2650b64f88d7ea2167d112b1a165f54b78d8a0756058ce5181cfedfe6c07841f405c405b40e46c825e57f491e6786b1e12edd0cafee74a7a90c470bd9b932916c0356084cb292c040b6fa92c6d5fb8ba8bdb00b6c0f306c19f4476d47281ef55e982f2217c62725bdcf2846219d6b704826bee13b14d975ae00"/257], 0x0) recvfrom(r0, &(0x7f00000000c0)=""/10, 0xa, 0x0, 0x0, 0x0) [ 592.280253] FAT-fs (loop5): Directory bread(block 6) failed [ 592.307823] FAT-fs (loop5): Directory bread(block 6) failed [ 592.316080] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 592.316080] Contact linux-ext4@vger.kernel.org if you think we should keep it. 14:27:02 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x0, 0x0) [ 592.316080] 14:27:02 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:02 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:02 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140), 0x0, 0x0) [ 592.380227] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 592.387062] EXT4-fs (loop0): mount failed 14:27:02 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) 14:27:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 592.507224] FAT-fs (loop5): Directory bread(block 6) failed [ 592.539311] FAT-fs (loop5): Directory bread(block 6) failed [ 592.677181] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 592.677181] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 592.677181] [ 592.701581] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 592.720697] EXT4-fs (loop0): get root inode failed [ 592.726069] EXT4-fs (loop0): mount failed 14:27:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:05 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x0, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:05 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) 14:27:05 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) clock_gettime(0x1, &(0x7f0000000140)={0x0, 0x0}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000002380)={'filter\x00', 0x7, 0x4, 0x3c8, 0xe8, 0x0, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000180), {[{{@arp={@multicast2, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_1\x00', 'geneve0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'caif0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@arp={@private, @rand_addr, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'xfrm0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="28572d49b7f2", @mac=@link_local, @broadcast, @private, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) unlinkat(r6, &(0x7f0000000000)='./file0\x00', 0x0) r7 = dup(r4) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x4e22, @remote}, {0x2, 0x100, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1}) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {r2, r3/1000+10000}}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r8, &(0x7f00000017c0), 0x1a5, 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r8, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB="c0820000", @ANYRES16=r9, @ANYBLOB="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"], 0x194}, 0x1, 0x0, 0x0, 0x8100}, 0x41) syz_emit_ethernet(0x34, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaaaa00cc000000080045000026000000f1ff109078000000000000000000004e200012907800000000000000000000dff18de17bde47d9d9848120d153f9c740b8b9d262705ac5dc4618700833108978aed491f09b550e541436b0e2c491fd053f4b7b4d7b7441b2f7583bdb016e681659e0a446e2650b64f88d7ea2167d112b1a165f54b78d8a0756058ce5181cfedfe6c07841f405c405b40e46c825e57f491e6786b1e12edd0cafee74a7a90c470bd9b932916c0356084cb292c040b6fa92c6d5fb8ba8bdb00b6c0f306c19f4476d47281ef55e982f2217c62725bdcf2846219d6b704826bee13b14d975ae00"/257], 0x0) recvfrom(r0, &(0x7f00000000c0)=""/10, 0xa, 0x0, 0x0, 0x0) 14:27:05 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) [ 595.357299] FAT-fs (loop5): Directory bread(block 6) failed [ 595.376602] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 595.376602] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 595.376602] 14:27:05 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x2c070000, 0x4f010000) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r0, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) [ 595.414104] FAT-fs (loop5): Directory bread(block 6) failed [ 595.438846] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated 14:27:05 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040), 0x0, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 595.466029] EXT4-fs (loop0): get root inode failed [ 595.484200] EXT4-fs (loop0): mount failed 14:27:05 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) 14:27:05 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x2c070000, 0x4f010000) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r0, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 595.674970] FAT-fs (loop5): Directory bread(block 6) failed [ 595.701205] FAT-fs (loop5): Directory bread(block 6) failed [ 595.716215] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 595.716215] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 595.716215] [ 595.747120] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 595.760261] EXT4-fs (loop0): get root inode failed [ 595.765353] EXT4-fs (loop0): mount failed 14:27:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:08 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) 14:27:08 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040), 0x0, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:08 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x2c070000, 0x4f010000) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r0, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) clock_gettime(0x1, &(0x7f0000000140)={0x0, 0x0}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000002380)={'filter\x00', 0x7, 0x4, 0x3c8, 0xe8, 0x0, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000180), {[{{@arp={@multicast2, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_1\x00', 'geneve0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'caif0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@arp={@private, @rand_addr, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'xfrm0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="28572d49b7f2", @mac=@link_local, @broadcast, @private, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) unlinkat(r6, &(0x7f0000000000)='./file0\x00', 0x0) r7 = dup(r4) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x4e22, @remote}, {0x2, 0x100, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1}) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {r2, r3/1000+10000}}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r8, &(0x7f00000017c0), 0x1a5, 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r8, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB="c0820000", @ANYRES16=r9, @ANYBLOB="000028bd7000fbdbdf25150000002c00098008000100ff010000180001000700000008000200ff0f0000080002001f000000080001000800000014000380080001000000000008000100020000008000058008000100756470000800010065746800080001007d647000080001006574680008000100756470004c000280080001001c0000000800040004000000080002000300000008000300f9ffffff08000400330600000800030006000000080002008a000000080004000500000008000300010000000800010074647000780004801300010062726f6164636173742d6c696e6b00000c00078008000400040000001300010062726f6164636173742d6c696e6b00000900010073797a3000000000340007800800010016000000080001000c00000008000200ffffff7f080003000f0000000800040001bfffff08000200060000004800028008000200000100003c00038008000100010001000800010005000000080002f6903e28ff080001000200000008000200000800800800010001000100080002000180ffff"], 0x194}, 0x1, 0x0, 0x0, 0x8100}, 0x41) syz_emit_ethernet(0x34, &(0x7f0000000600)=ANY=[@ANYBLOB="aaaaaaaaaaaa00cc000000080045000026000000f1ff109078000000000000000000004e200012907800000000000000000000dff18de17bde47d9d9848120d153f9c740b8b9d262705ac5dc4618700833108978aed491f09b550e541436b0e2c491fd053f4b7b4d7b7441b2f7583bdb016e681659e0a446e2650b64f88d7ea2167d112b1a165f54b78d8a0756058ce5181cfedfe6c07841f405c405b40e46c825e57f491e6786b1e12edd0cafee74a7a90c470bd9b932916c0356084cb292c040b6fa92c6d5fb8ba8bdb00b6c0f306c19f4476d47281ef55e982f2217c62725bdcf2846219d6b704826bee13b14d975ae00"/257], 0x0) 14:27:08 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x0, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) clock_gettime(0x1, &(0x7f0000000140)={0x0, 0x0}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000002380)={'filter\x00', 0x7, 0x4, 0x3c8, 0xe8, 0x0, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000180), {[{{@arp={@multicast2, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_1\x00', 'geneve0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'caif0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@arp={@private, @rand_addr, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'xfrm0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="28572d49b7f2", @mac=@link_local, @broadcast, @private, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) unlinkat(r6, &(0x7f0000000000)='./file0\x00', 0x0) r7 = dup(r4) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x4e22, @remote}, {0x2, 0x100, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1}) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {r2, r3/1000+10000}}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r8, &(0x7f00000017c0), 0x1a5, 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r8, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB="c0820000", @ANYRES16=r9, @ANYBLOB="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"], 0x194}, 0x1, 0x0, 0x0, 0x8100}, 0x41) [ 598.415656] FAT-fs (loop5): Directory bread(block 6) failed [ 598.422411] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 598.422411] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 598.422411] [ 598.442124] FAT-fs (loop5): Directory bread(block 6) failed 14:27:08 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040), 0x0, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:08 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100)}], 0x1, 0x0) [ 598.476737] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 598.510341] EXT4-fs (loop0): group descriptors corrupted! 14:27:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) clock_gettime(0x1, &(0x7f0000000140)={0x0, 0x0}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000002380)={'filter\x00', 0x7, 0x4, 0x3c8, 0xe8, 0x0, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000180), {[{{@arp={@multicast2, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_1\x00', 'geneve0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'caif0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@arp={@private, @rand_addr, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'xfrm0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="28572d49b7f2", @mac=@link_local, @broadcast, @private, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) unlinkat(r6, &(0x7f0000000000)='./file0\x00', 0x0) r7 = dup(r4) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x4e22, @remote}, {0x2, 0x100, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1}) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {r2, r3/1000+10000}}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r8, &(0x7f00000017c0), 0x1a5, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') 14:27:08 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x0, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) [ 598.640748] FAT-fs (loop5): Directory bread(block 6) failed [ 598.655222] FAT-fs (loop5): Directory bread(block 6) failed 14:27:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) r0 = memfd_create(&(0x7f0000000080)='\x19i\xc5s\x0f\xe8\xac\xd9~\x88\x15R\xcd\\\x01\xaa\x8a#eg\xdd\xa8\xb9\xdf-\x1c[*J\"\xa1\r\xcd\xf5\xc9JL&ja\x940x0, 0x0}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000002380)={'filter\x00', 0x7, 0x4, 0x3c8, 0xe8, 0x0, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000180), {[{{@arp={@multicast2, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_1\x00', 'geneve0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'caif0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@arp={@private, @rand_addr, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'xfrm0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="28572d49b7f2", @mac=@link_local, @broadcast, @private, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) unlinkat(r6, &(0x7f0000000000)='./file0\x00', 0x0) r7 = dup(r4) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x4e22, @remote}, {0x2, 0x100, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1}) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {r2, r3/1000+10000}}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') preadv(r8, &(0x7f00000017c0), 0x1a5, 0x0, 0x0) 14:27:11 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e7803251000000000000416600", 0x23, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:11 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x0, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:11 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x0, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) clock_gettime(0x1, &(0x7f0000000140)={0x0, 0x0}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000002380)={'filter\x00', 0x7, 0x4, 0x3c8, 0xe8, 0x0, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000180), {[{{@arp={@multicast2, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_1\x00', 'geneve0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'caif0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@arp={@private, @rand_addr, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'xfrm0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="28572d49b7f2", @mac=@link_local, @broadcast, @private, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) unlinkat(r6, &(0x7f0000000000)='./file0\x00', 0x0) r7 = dup(r4) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x4e22, @remote}, {0x2, 0x100, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1}) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {r2, r3/1000+10000}}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000000)) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') 14:27:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) r0 = memfd_create(&(0x7f0000000080)='\x19i\xc5s\x0f\xe8\xac\xd9~\x88\x15R\xcd\\\x01\xaa\x8a#eg\xdd\xa8\xb9\xdf-\x1c[*J\"\xa1\r\xcd\xf5\xc9JL&ja\x940x0, 0x0}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f0000002380)={'filter\x00', 0x7, 0x4, 0x3c8, 0xe8, 0x0, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000180), {[{{@arp={@multicast2, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_1\x00', 'geneve0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'caif0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@arp={@private, @rand_addr, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'xfrm0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="28572d49b7f2", @mac=@link_local, @broadcast, @private, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) unlinkat(r6, &(0x7f0000000000)='./file0\x00', 0x0) r7 = dup(r4) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @multicast1}, {0x2, 0x4e22, @remote}, {0x2, 0x100, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x1}) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {r2, r3/1000+10000}}) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') [ 601.514344] FAT-fs (loop5): Directory bread(block 6) failed [ 601.523598] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:27:11 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e7803251000000000000416600", 0x23, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 601.574185] EXT4-fs (loop0): group descriptors corrupted! 14:27:11 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x0, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) [ 601.725325] FAT-fs (loop5): Directory bread(block 6) failed [ 601.750108] FAT-fs (loop5): Directory bread(block 6) failed 14:27:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:14 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) r0 = memfd_create(&(0x7f0000000080)='\x19i\xc5s\x0f\xe8\xac\xd9~\x88\x15R\xcd\\\x01\xaa\x8a#eg\xdd\xa8\xb9\xdf-\x1c[*J\"\xa1\r\xcd\xf5\xc9JL&ja\x940xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) clock_gettime(0x1, &(0x7f0000000140)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000002380)={'filter\x00', 0x7, 0x4, 0x3c8, 0xe8, 0x0, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000180), {[{{@arp={@multicast2, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_1\x00', 'geneve0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'caif0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@arp={@private, @rand_addr, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'xfrm0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="28572d49b7f2", @mac=@link_local, @broadcast, @private, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) unlinkat(r3, &(0x7f0000000000)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') 14:27:17 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffff", 0x34, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:17 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) fsync(0xffffffffffffffff) 14:27:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 607.550247] FAT-fs (loop5): Directory bread(block 6) failed [ 607.587318] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 14:27:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) clock_gettime(0x1, &(0x7f0000000140)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000002380)={'filter\x00', 0x7, 0x4, 0x3c8, 0xe8, 0x0, 0x0, 0x2e0, 0x2e0, 0x2e0, 0x4, &(0x7f0000000180), {[{{@arp={@multicast2, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@remote}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_1\x00', 'geneve0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'caif0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@arp={@private, @rand_addr, 0x0, 0x0, 0x0, 0x0, {@mac=@broadcast}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'batadv0\x00', 'xfrm0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="28572d49b7f2", @mac=@link_local, @broadcast, @private, 0x2}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x418) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') 14:27:17 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:17 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) fsync(0xffffffffffffffff) [ 607.587318] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 607.587318] [ 607.595128] FAT-fs (loop5): Directory bread(block 6) failed [ 607.661132] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:27:17 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffff", 0x34, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:17 executing program 2: r0 = memfd_create(&(0x7f0000000080)='\x19i\xc5s\x0f\xe8\xac\xd9~\x88\x15R\xcd\\\x01\xaa\x8a#eg\xdd\xa8\xb9\xdf-\x1c[*J\"\xa1\r\xcd\xf5\xc9JL&ja\x940xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:20 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, 0x0, 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:20 executing program 2: r0 = memfd_create(0x0, 0x0) fsync(r0) 14:27:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) clock_gettime(0x1, &(0x7f0000000140)) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') 14:27:20 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ff", 0x3d, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 610.601971] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 610.601971] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 610.601971] 14:27:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) clock_gettime(0x1, &(0x7f0000000140)) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') 14:27:20 executing program 2: r0 = memfd_create(0x0, 0x0) fsync(r0) [ 610.651525] FAT-fs (loop5): Directory bread(block 6) failed [ 610.664361] FAT-fs (loop5): Directory bread(block 6) failed [ 610.684985] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:27:20 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ff", 0x3d, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:20 executing program 2: r0 = memfd_create(0x0, 0x0) fsync(r0) [ 610.722682] EXT4-fs (loop0): group descriptors corrupted! 14:27:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) clock_gettime(0x1, &(0x7f0000000140)) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') 14:27:20 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, 0x0, 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) [ 610.852832] FAT-fs (loop5): Directory bread(block 6) failed [ 610.865761] FAT-fs (loop5): Directory bread(block 6) failed 14:27:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300), 0x0, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x2, @local}, 0x10) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') 14:27:23 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ff", 0x3d, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:23 executing program 2: memfd_create(&(0x7f0000000080)='\x19i\xc5s\x0f\xe8\xac\xd9~\x88\x15R\xcd\\\x01\xaa\x8a#eg\xdd\xa8\xb9\xdf-\x1c[*J\"\xa1\r\xcd\xf5\xc9JL&ja\x940xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300), 0x0, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:26 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') 14:27:26 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) getrusage(0xffffffffffffffff, &(0x7f0000000240)) 14:27:26 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:26 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:26 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') [ 616.749243] FAT-fs (loop5): Directory bread(block 6) failed [ 616.753331] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 616.753331] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 616.753331] [ 616.787980] FAT-fs (loop5): Directory bread(block 6) failed 14:27:26 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:27:26 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46", 0x41, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 616.855180] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:27:26 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') [ 616.903437] EXT4-fs (loop0): group descriptors corrupted! [ 616.903807] audit: type=1804 audit(1600612046.682:153): pid=27386 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir234045464/syzkaller.ooWl0E/243/file0" dev="sda1" ino=16353 res=1 14:27:26 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300), 0x0, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 616.992413] FAT-fs (loop5): Directory bread(block 6) failed [ 617.008558] FAT-fs (loop5): Directory bread(block 6) failed [ 617.129808] audit: type=1804 audit(1600612046.902:154): pid=27409 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir234045464/syzkaller.ooWl0E/244/file0" dev="sda1" ino=16163 res=1 [ 617.160659] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 617.160659] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 617.160659] [ 617.178890] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 617.192054] EXT4-fs (loop0): group descriptors corrupted! [ 617.716040] Bluetooth: hci1: command 0x0406 tx timeout 14:27:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:29 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') 14:27:29 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c", 0x43, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:27:29 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="0200000003", 0x5, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 619.784399] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 619.784399] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 619.784399] [ 619.813022] FAT-fs (loop5): Directory bread(block 6) failed 14:27:29 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0x0, 0x0) [ 619.838390] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 619.859165] FAT-fs (loop5): Directory bread(block 6) failed 14:27:29 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:29 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c", 0x43, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:29 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0x0, 0x0) [ 619.889436] EXT4-fs (loop0): group descriptors corrupted! 14:27:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="0200000003", 0x5, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:29 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 620.080961] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 620.080961] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 620.080961] [ 620.099264] FAT-fs (loop5): Directory bread(block 6) failed [ 620.108411] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 620.118161] FAT-fs (loop5): Directory bread(block 6) failed [ 620.136902] EXT4-fs (loop0): group descriptors corrupted! 14:27:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:32 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000000180)="8a", 0x1}], 0x4, 0x0, 0x0) 14:27:32 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) syz_open_procfs(0x0, 0x0) 14:27:32 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c", 0x43, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="0200000003", 0x5, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 622.834412] FAT-fs (loop5): Directory bread(block 6) failed [ 622.862453] FAT-fs (loop5): Directory bread(block 6) failed [ 622.869657] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 622.869657] Contact linux-ext4@vger.kernel.org if you think we should keep it. 14:27:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 622.869657] 14:27:32 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45", 0x44, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) 14:27:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:32 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, 0x0, 0x0, 0x0, 0x0) [ 622.958114] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 623.013348] EXT4-fs (loop0): group descriptors corrupted! 14:27:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000", 0x7, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:32 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:27:32 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45", 0x44, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 623.081672] FAT-fs (loop5): Directory bread(block 6) failed [ 623.092732] FAT-fs (loop5): Directory bread(block 6) failed 14:27:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) 14:27:33 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, 0x0, 0x0, 0x0, 0x0) [ 623.214884] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 623.214884] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 623.214884] [ 623.254661] FAT-fs (loop5): Directory bread(block 6) failed [ 623.269300] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 623.287808] FAT-fs (loop5): Directory bread(block 6) failed [ 623.295934] EXT4-fs (loop0): group descriptors corrupted! 14:27:33 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45", 0x44, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:27:33 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, 0x0, 0x0, 0x0, 0x0) 14:27:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000", 0x7, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 623.490490] FAT-fs (loop5): Directory bread(block 6) failed [ 623.519056] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 623.519056] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 623.519056] 14:27:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) [ 623.547961] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 623.565256] EXT4-fs (loop0): group descriptors corrupted! [ 623.572345] FAT-fs (loop5): Directory bread(block 6) failed 14:27:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:35 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000", 0x7, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:35 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340), 0x0, 0x0, 0x0) 14:27:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) 14:27:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 626.078301] FAT-fs (loop5): bogus number of reserved sectors [ 626.085650] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 626.085650] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 626.085650] [ 626.102113] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:35 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:35 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340), 0x0, 0x0, 0x0) [ 626.124005] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 626.142195] EXT4-fs (loop0): group descriptors corrupted! 14:27:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="0200000003000000", 0x8, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:27:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) [ 626.331789] FAT-fs (loop5): bogus number of reserved sectors [ 626.336010] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 626.336010] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 626.336010] [ 626.360193] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:36 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340), 0x0, 0x0, 0x0) [ 626.401706] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 626.414317] EXT4-fs (loop0): group descriptors corrupted! 14:27:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:38 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="0200000003000000", 0x8, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) 14:27:38 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:27:38 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{0x0}], 0x1, 0x0, 0x0) 14:27:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 629.099852] FAT-fs (loop5): bogus number of reserved sectors [ 629.121211] FAT-fs (loop5): Can't find a valid FAT filesystem [ 629.130998] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 629.130998] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 629.130998] 14:27:39 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:39 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{0x0}], 0x1, 0x0, 0x0) [ 629.181783] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock 14:27:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 629.252399] EXT4-fs (loop0): group descriptors corrupted! 14:27:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:27:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:27:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="0200000003000000", 0x8, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 629.333712] FAT-fs (loop5): bogus number of reserved sectors [ 629.351169] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:39 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:39 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{0x0}], 0x1, 0x0, 0x0) [ 629.503447] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 629.503447] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 629.503447] 14:27:39 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)}], 0x1, 0x0, 0x0) 14:27:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 629.549460] EXT4-fs (loop0): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 629.568819] FAT-fs (loop5): bogus number of reserved sectors [ 629.585496] FAT-fs (loop5): Can't find a valid FAT filesystem [ 629.601747] EXT4-fs (loop0): group descriptors corrupted! 14:27:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:27:39 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 629.790660] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 629.790660] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 629.790660] [ 629.791723] FAT-fs (loop5): bogus number of reserved sectors 14:27:39 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)}], 0x1, 0x0, 0x0) 14:27:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 629.832495] FAT-fs (loop5): Can't find a valid FAT filesystem [ 629.838317] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 14:27:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 629.886899] EXT4-fs (loop0): group descriptors corrupted! 14:27:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:42 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:42 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r0, 0x11, 0x2c070000, 0x4f010000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2b442, 0x0) pwritev(r1, &(0x7f0000002340)=[{&(0x7f0000000180)}], 0x1, 0x0, 0x0) 14:27:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:27:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) dup3(r2, r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 632.439351] FAT-fs (loop5): bogus number of reserved sectors [ 632.448428] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 632.448428] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 632.448428] [ 632.458448] FAT-fs (loop5): Can't find a valid FAT filesystem [ 632.473277] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 632.494402] EXT4-fs (loop0): group descriptors corrupted! 14:27:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:42 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:27:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) dup3(r2, r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:27:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[], 0x14}}, 0x0) [ 632.720259] FAT-fs (loop5): bogus number of reserved sectors [ 632.730358] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 632.730358] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 632.730358] [ 632.747067] FAT-fs (loop5): Can't find a valid FAT filesystem [ 632.771782] EXT4-fs (loop0): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 632.773095] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 632.807613] EXT4-fs (loop0): group descriptors corrupted! 14:27:42 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 632.835153] validate_nla: 13 callbacks suppressed [ 632.835165] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 632.962038] FAT-fs (loop5): bogus number of reserved sectors [ 632.991121] FAT-fs (loop5): Can't find a valid FAT filesystem [ 633.233308] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 14:27:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:27:45 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) dup3(r2, r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:27:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffff7ffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[], 0x14}}, 0x0) [ 635.477630] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 14:27:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:45 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 635.520258] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 635.521702] FAT-fs (loop5): bogus number of reserved sectors [ 635.541326] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) dup3(r2, r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:27:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) dup3(0xffffffffffffffff, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 635.668862] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 635.673947] FAT-fs (loop5): bogus number of reserved sectors [ 635.681214] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:45 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 635.820536] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 635.879973] FAT-fs (loop5): bogus number of reserved sectors [ 635.891895] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) dup3(r2, r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:27:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) dup3(0xffffffffffffffff, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:27:48 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400", 0xc}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:27:48 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400", 0xc}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 638.571472] FAT-fs (loop5): bogus number of reserved sectors [ 638.577801] FAT-fs (loop5): Can't find a valid FAT filesystem [ 638.608743] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 14:27:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:27:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) dup3(0xffffffffffffffff, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:27:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) dup3(r2, r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:27:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) [ 638.790658] FAT-fs (loop5): bogus number of reserved sectors [ 638.820801] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:48 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400", 0xc}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 638.895839] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 14:27:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 638.993027] FAT-fs (loop5): bogus number of reserved sectors [ 638.998638] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 639.011990] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:48 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240", 0x12}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:48 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:27:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:48 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) [ 639.130711] FAT-fs (loop5): invalid media value (0x00) [ 639.142022] FAT-fs (loop5): Can't find a valid FAT filesystem [ 639.224498] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 14:27:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) dup3(0xffffffffffffffff, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:27:51 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240", 0x12}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1) 14:27:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:27:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1) [ 641.733587] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 641.772179] FAT-fs (loop5): invalid media value (0x00) 14:27:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:51 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1) [ 641.807689] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:51 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240", 0x12}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:27:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) dup3(0xffffffffffffffff, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 641.915843] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 642.016199] FAT-fs (loop5): invalid media value (0x00) [ 642.049686] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029", 0x2d, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:27:54 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004", 0x15}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) dup3(0xffffffffffffffff, r0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:27:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 644.746742] FAT-fs (loop5): invalid media value (0x00) 14:27:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 644.770991] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 644.771656] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:27:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029", 0x2d, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:54 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004", 0x15}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:27:54 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) [ 645.014486] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 645.028128] FAT-fs (loop5): invalid media value (0x00) [ 645.051196] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:27:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:27:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:27:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029", 0x2d, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 14:27:57 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004", 0x15}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:27:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) [ 647.791901] FAT-fs (loop5): invalid media value (0x00) [ 647.809969] FAT-fs (loop5): Can't find a valid FAT filesystem 14:27:57 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:27:57 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 647.884776] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 14:27:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f", 0x44, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:27:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 14:27:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 648.022719] FAT-fs (loop5): bogus number of FAT sectors [ 648.047350] FAT-fs (loop5): Can't find a valid FAT filesystem [ 648.122145] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 648.122145] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 648.122145] [ 648.163947] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 648.181346] EXT4-fs (loop0): get root inode failed [ 648.186972] EXT4-fs (loop0): mount failed 14:28:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:00 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x1) 14:28:00 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:28:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f", 0x44, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 650.816558] FAT-fs (loop5): bogus number of FAT sectors [ 650.825224] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 650.825224] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 650.825224] [ 650.852304] FAT-fs (loop5): Can't find a valid FAT filesystem 14:28:00 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x1) 14:28:00 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}, {@utf8no='utf8=0'}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 650.921468] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 650.941518] EXT4-fs (loop0): get root inode failed 14:28:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 650.966852] EXT4-fs (loop0): mount failed 14:28:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f", 0x44, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 651.070892] FAT-fs (loop5): bogus number of FAT sectors [ 651.084066] FAT-fs (loop5): Can't find a valid FAT filesystem [ 651.194482] EXT4-fs (loop0): Mount option "noacl" will be removed by 3.5 [ 651.194482] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 651.194482] [ 651.211986] EXT4-fs error (device loop0): ext4_fill_super:4448: inode #2: comm syz-executor.0: iget: root inode unallocated [ 651.225808] EXT4-fs (loop0): get root inode failed [ 651.230849] EXT4-fs (loop0): mount failed 14:28:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:03 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x1) 14:28:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:03 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:28:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) fcntl$addseals(r1, 0x409, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) fcntl$addseals(r1, 0x409, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 653.863132] EXT4-fs (loop0): invalid first ino: 0 14:28:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, 0xffffffffffffffff, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:03 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x1) 14:28:03 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:28:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) fcntl$addseals(r1, 0x409, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 654.114064] EXT4-fs (loop0): invalid first ino: 0 14:28:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, 0xffffffffffffffff, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:06 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x1) 14:28:06 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:28:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f0000000000000000010000", 0x4f, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, 0xffffffffffffffff, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 656.953363] EXT4-fs (loop0): invalid first ino: 0 14:28:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:06 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:28:06 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x1) 14:28:06 executing program 2: r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2) fcntl$addseals(r0, 0x409, 0x8) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 657.199466] EXT4-fs (loop0): unsupported inode size: 0 [ 657.201159] FAT-fs (loop5): Directory bread(block 6) failed [ 657.207216] EXT4-fs (loop0): blocksize: 4096 14:28:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:09 executing program 2: r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2) fcntl$addseals(r0, 0x409, 0x8) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:28:09 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x1) 14:28:09 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:28:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:09 executing program 2: r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2) fcntl$addseals(r0, 0x409, 0x8) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:28:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, 0xffffffffffffffff, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 659.946382] FAT-fs (loop5): Directory bread(block 6) failed 14:28:09 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) [ 660.016589] EXT4-fs (loop0): unsupported inode size: 0 14:28:09 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x1) [ 660.046195] EXT4-fs (loop0): blocksize: 4096 14:28:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, 0xffffffffffffffff, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:09 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 660.145458] FAT-fs (loop5): Directory bread(block 6) failed 14:28:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b", 0x55, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, 0xffffffffffffffff, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:12 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x1) 14:28:12 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)) openat$dir(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x0) 14:28:12 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:12 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 663.017195] FAT-fs (loop5): Directory bread(block 6) failed [ 663.060476] EXT4-fs (loop0): unsupported inode size: 0 14:28:12 executing program 4: r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2) fcntl$addseals(r0, 0x409, 0x8) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:28:12 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}]}) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:28:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 663.081761] EXT4-fs (loop0): blocksize: 4096 14:28:12 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x1) 14:28:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:28:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2) fcntl$addseals(r0, 0x409, 0x8) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:28:13 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}]}) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 663.221796] FAT-fs (loop5): Directory bread(block 6) failed 14:28:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:28:13 executing program 4: r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2) fcntl$addseals(r0, 0x409, 0x8) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:28:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2) fcntl$addseals(r0, 0x409, 0x8) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:28:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 14:28:13 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x1) [ 663.357839] EXT4-fs (loop0): unsupported inode size: 0 [ 663.377386] EXT4-fs (loop0): blocksize: 4096 14:28:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:13 executing program 4: r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2) fcntl$addseals(r0, 0x409, 0x8) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:28:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2) fcntl$addseals(r0, 0x409, 0x8) pwritev(r0, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:28:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) [ 663.455569] FAT-fs (loop5): Directory bread(block 6) failed 14:28:13 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000040)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x45, 0x600}], 0x0, &(0x7f0000000300)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}]}) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) 14:28:13 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x1) 14:28:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(0x0, 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:13 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 663.670092] FAT-fs (loop5): Directory bread(block 6) failed [ 663.677793] EXT4-fs (loop0): unsupported inode size: 0 [ 663.702181] EXT4-fs (loop0): blocksize: 4096 14:28:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(0x0, 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b000000", 0x58, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:13 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x1) 14:28:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:13 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(0x0, 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 663.985286] EXT4-fs (loop0): unsupported inode size: 0 [ 664.004615] EXT4-fs (loop0): blocksize: 4096 14:28:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:13 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:13 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x1) [ 664.066097] ptrace attach of "/root/syz-executor.3"[28487] was attempted by "/root/syz-executor.3"[28489] 14:28:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2) fcntl$addseals(r0, 0x409, 0x8) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:28:14 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 664.194830] EXT4-fs (loop0): unsupported inode size: 0 [ 664.206634] EXT4-fs (loop0): blocksize: 4096 [ 664.225908] ptrace attach of "/root/syz-executor.3"[28505] was attempted by "/root/syz-executor.3"[28506] 14:28:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2) fcntl$addseals(r0, 0x409, 0x8) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:28:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:14 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x1) 14:28:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 664.396960] ptrace attach of "/root/syz-executor.3"[28518] was attempted by "/root/syz-executor.3"[28521] 14:28:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r0, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x2) fcntl$addseals(r0, 0x409, 0x8) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup3(r1, r0, 0x0) dup3(r2, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) 14:28:14 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 664.462794] EXT4-fs (loop0): unsupported inode size: 0 [ 664.478233] EXT4-fs (loop0): blocksize: 4096 14:28:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(0x0, 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b00000000", 0x59, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:14 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(0x0, 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 664.715818] EXT4-fs (loop0): unsupported inode size: 0 [ 664.729008] EXT4-fs (loop0): blocksize: 4096 14:28:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:14 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:14 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, 0x0, 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:14 executing program 5: ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(0x0, 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 664.994660] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 14:28:14 executing program 5: ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:14 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:14 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:14 executing program 5: ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, 0x0, 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 665.231066] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 14:28:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)={[{@noacl='noacl'}]}) 14:28:15 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, 0x0, 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:15 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) [ 665.426813] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 14:28:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, 0x0) 14:28:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:15 executing program 5: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, 0x0) 14:28:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:15 executing program 5: syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:15 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:18 executing program 5: syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, 0x0) 14:28:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, 0x0, 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)) 14:28:18 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, 0x0, 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:18 executing program 5: syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:18 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) [ 668.896449] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 14:28:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, 0x0, 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:21 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) 14:28:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, 0x0, 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)) 14:28:21 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) 14:28:21 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, 0x0, 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 671.837361] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 14:28:21 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) 14:28:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:24 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100001310000029c4645f29c4640700000000000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000000040)) 14:28:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, 0x0, 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:24 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x0) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) [ 674.894225] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 14:28:24 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x0) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:24 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:24 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:24 executing program 0: unshare(0x6c060000) socket(0x0, 0x0, 0x0) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) [ 675.309620] IPVS: ftp: loaded support on port[0] = 21 14:28:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x0) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:27 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:27 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, 0x0, 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:27 executing program 0: unshare(0x6c060000) socket(0x0, 0x0, 0x0) connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_rdma(0xffffffffffffffff, 0x3, 0x14) 14:28:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:27 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:27 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0x0, 0x6, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:27 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, 0x0, 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 677.979987] IPVS: ftp: loaded support on port[0] = 21 14:28:27 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:27 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, 0x0, 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:30 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040), 0x0) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:30 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x0) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f00000000c0)="2d443b1f432b", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x0) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x0) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:33 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x0, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:33 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040), 0x0) ioctl$TCXONC(r2, 0x540a, 0x1) 14:28:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x0) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x0) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:33 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x0) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:34 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x0, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:34 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x0, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:36 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:36 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:36 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x0, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:37 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:39 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, 0x0, 0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:39 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x3, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)='-D;', 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:39 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:39 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, 0x0, 0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:40 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x5, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f43", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:42 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:42 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x5, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f43", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, 0x0, 0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:42 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x0) 14:28:43 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000659000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000200)={0x53, 0xffffffffffffffff, 0x5, 0x0, @buffer={0x0, 0x47, &(0x7f0000000000)=""/71}, &(0x7f00000000c0)="2d443b1f43", 0x0, 0x0, 0x0, 0x0, 0x0}) 14:28:43 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x0, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040), 0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:43 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040), 0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x0, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:45 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:28:45 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040), 0x0, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:45 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x0) 14:28:46 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:28:46 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{0x0}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x0, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:46 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:28:46 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:49 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:28:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{0x0}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:49 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) socket$packet(0x11, 0x2, 0x300) r3 = dup3(0xffffffffffffffff, r2, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:49 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write(r2, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r2, 0x540a, 0x0) 14:28:49 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:28:49 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{0x0}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:49 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:28:49 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) socket$packet(0x11, 0x2, 0x300) r3 = dup3(0xffffffffffffffff, r2, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:52 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) mmap(&(0x7f0000200000/0x400000)=nil, 0x519000, 0x0, 0x2012, 0xffffffffffffffff, 0x0) 14:28:52 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:28:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) socket$packet(0x11, 0x2, 0x300) r3 = dup3(0xffffffffffffffff, r2, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:28:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:28:52 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) mmap(&(0x7f0000200000/0x400000)=nil, 0x519000, 0x0, 0x2012, 0xffffffffffffffff, 0x0) 14:28:52 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:28:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) [ 702.385781] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 14:28:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:52 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NFNL_MSG_ACCT_NEW(r1, 0x0, 0x8004) mmap(&(0x7f0000200000/0x400000)=nil, 0x519000, 0x0, 0x2012, 0xffffffffffffffff, 0x0) 14:28:52 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) [ 702.558905] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 14:28:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:55 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, 0xffffffffffffffff, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:28:55 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:28:55 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:55 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) [ 705.388276] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 14:28:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:28:55 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x0, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) [ 705.525836] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 14:28:55 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:28:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:28:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:28:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, 0xffffffffffffffff, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:58 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x0, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:28:58 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:28:58 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) r1 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:28:58 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, 0xffffffffffffffff, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:29:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x0, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:29:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:01 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:29:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:01 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:01 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:29:01 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:01 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:29:01 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) dup3(r3, r2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) r3 = dup3(0xffffffffffffffff, r2, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:29:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:04 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) dup3(r3, r2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) r3 = dup3(0xffffffffffffffff, r2, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:29:04 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:04 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:29:04 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:04 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() creat(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:07 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:29:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) dup3(r3, r2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) r3 = dup3(0xffffffffffffffff, r2, 0x0) dup3(r3, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:07 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:07 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:07 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:07 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:10 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, 0xffffffffffffffff, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:29:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:29:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:10 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd93\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:10 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:29:10 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:10 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:29:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, 0xffffffffffffffff, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:29:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd93\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x40) 14:29:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:16 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, 0xffffffffffffffff, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) 14:29:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x40) 14:29:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40) 14:29:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(0x0, 0x5) mmap(&(0x7f0000200000/0x400000)=nil, 0x519000, 0x0, 0x2012, r2, 0x0) 14:29:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40) 14:29:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(0x0, 0x5) mmap(&(0x7f0000200000/0x400000)=nil, 0x519000, 0x0, 0x2012, r2, 0x0) 14:29:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(0x0, 0x5) mmap(&(0x7f0000200000/0x400000)=nil, 0x519000, 0x0, 0x2012, r2, 0x0) 14:29:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) dup3(r3, r2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x40) 14:29:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x40) 14:29:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x40) 14:29:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) dup3(r3, r2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:22 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x40) 14:29:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, 0x0, 0x0) 14:29:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, 0x0, 0x0) 14:29:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, 0x0, 0x0) 14:29:22 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:29:25 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x0, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:29:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) dup3(r3, r2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 14:29:25 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:29:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 14:29:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) memfd_create(&(0x7f0000000ac0)='Y\xff\xff\x00\x00\x00\x00\x00K\xb2\x02\x80B\xe9\xe8\xcc\xde\x06\x00l\xa8\x1aJ\xaf\xb2M\xba\xb8_\x05U\xcd<|>\x9e\xec^\x0e\xbe\x18+-\x9b\x893\x02\x00\xa6\x1f+\xb3\xc5\x90z5\xe0\xdfi\xb7\x9f\xb4QW\xc9\xc9\x92\x03\t\x00\x00\x00\x00\x00\xb2\x0f\xee\xbe\f8\xcc\x7f\x00\x00\x00Z\x81\x00\x00\x00\x00\x18I\x13\xf1\xa2x\x04\x81R\xd45R\xae\x84\xcdN\xf7\xf6\b~\xed_M^dQ:\xbc\xafq\x88\x19nSF|;]\xe1A\x8c\x8a\x98\xd7|\xdcLF\r\xb1\xfd\xbf\x8b\xc7u\xccP\xdd\x13~\x89\xcf\x85\xca\xa0%\xc6\xc7\x11\x00\x00\x00\x00\x00\x00\x00?M9\\\av~\'\xd9\xb0\xacdya]8\x9d\xb7\v\xf39\xc5{\x9c\x83\xe7\ng\x87\xd930xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:29:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8380db}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:29:28 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400, 0x0, 0x1}, 0x40) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x20000000) bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)={0x0}, 0x10) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, &(0x7f00000002c0)=r1, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='freezer.self_freezing\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000740)=[{0x0}, {&(0x7f0000000100)="cab39e7658", 0x5}], 0x2}, 0x1) sendmsg$kcm(r2, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x4, 0x0, 0x0, 0x40020000}, 0x6d70) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000480)="7093a0", &(0x7f0000000280), 0x7}, 0x38) openat$cgroup_ro(r0, &(0x7f0000000140)='net_prio.prioidx\x00', 0x0, 0x0) 14:29:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 14:29:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x8829}]}, 0x68}}, 0x40) 14:29:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) 14:29:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x60}}, 0x40) 14:29:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={0x0, 0x54}}, 0x0) 14:29:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={0x0, 0x54}}, 0x0) 14:29:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}]}, 0x58}}, 0x40) 14:29:28 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) 14:29:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={0x0, 0x54}}, 0x0) 14:29:31 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:31 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}]}, 0x58}}, 0x40) 14:29:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2], 0x54}}, 0x0) 14:29:31 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) 14:29:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000180)=""/246) ioctl$EVIOCGREP(r0, 0x4004743c, 0x0) 14:29:31 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}]}, 0x58}}, 0x40) [ 742.070276] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2], 0x54}}, 0x0) [ 742.117434] syz-executor.5 (29807) used obsolete PPPIOCDETACH ioctl 14:29:32 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8}]}, 0x60}}, 0x40) 14:29:32 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x4, 0x0, 0x0, 0x40020000}, 0x6d70) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 14:29:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x1318, 0x11, 0x0, 0x27) [ 742.258852] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r0, r1, &(0x7f0000000000), 0x2) fcntl$addseals(r1, 0x409, 0x8) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup3(r2, r1, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:34 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2], 0x54}}, 0x0) 14:29:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8}]}, 0x60}}, 0x40) 14:29:34 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x20000000) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff000}], 0x4, 0x0, 0x0, 0x40020000}, 0x6d70) 14:29:34 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) poll(&(0x7f0000000540)=[{r0}], 0x1, 0x0) 14:29:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f00000000c0)=0x87, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000880)="0c7f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae171155d88fecf90b1a7511bf746bec66ba", 0xffffffffffffff47, 0x40011, 0x0, 0x49) recvmsg(r0, &(0x7f0000001500)={0x0, 0xf4010003, &(0x7f0000002200)=[{&(0x7f00000035c0)=""/4106, 0x200045ca}], 0x1, 0x0, 0x8006}, 0x100) 14:29:34 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8}]}, 0x60}}, 0x40) [ 745.130684] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:35 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB], 0x54}}, 0x0) 14:29:35 executing program 4: r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000280)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4) fcntl$setstatus(r0, 0x4, 0x6100) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x17ffffa, 0x4002011, r2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x40004) 14:29:35 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x58}}, 0x40) [ 745.281386] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. [ 745.294157] audit: type=1800 audit(1600612175.082:155): pid=29883 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16881 res=0 14:29:35 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) [ 745.409278] audit: type=1800 audit(1600612175.162:156): pid=29888 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16881 res=0 14:29:37 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB], 0x54}}, 0x0) 14:29:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r2, 0x0) 14:29:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x58}}, 0x40) 14:29:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 14:29:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 748.154175] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r2, 0x0) 14:29:38 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB], 0x54}}, 0x0) 14:29:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x58}}, 0x40) 14:29:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 748.231087] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r2, 0x0) 14:29:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x60}}, 0x40) [ 748.369830] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. [ 748.411716] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:40 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:29:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_RMID(r2, 0x0) 14:29:40 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f73"], 0x54}}, 0x0) 14:29:40 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x60}}, 0x40) 14:29:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:29:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x60, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_MASTER={0x8}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x60}}, 0x40) 14:29:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 751.272865] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 751.284180] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f73"], 0x54}}, 0x0) 14:29:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:29:41 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x58}}, 0x40) 14:29:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 751.492268] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 751.501620] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x58}}, 0x40) 14:29:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:29:44 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f73"], 0x54}}, 0x0) 14:29:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:29:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 14:29:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 754.300836] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c000580"], 0x54}}, 0x0) 14:29:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x58}}, 0x40) [ 754.344451] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:29:44 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 754.446148] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c000580"], 0x54}}, 0x0) 14:29:44 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) [ 754.582527] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 754.645514] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea3", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:47 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:29:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x58, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_MTU={0x8, 0x4, 0x10001}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x58}}, 0x40) 14:29:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c000580"], 0x54}}, 0x0) 14:29:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:29:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) 14:29:47 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x50}}, 0x40) 14:29:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 757.352002] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) [ 757.376322] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:47 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:29:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c000580050019000300"], 0x54}}, 0x0) 14:29:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[], 0x8) sendfile(r1, r2, &(0x7f0000000000), 0x2) fcntl$addseals(r2, 0x409, 0x8) pwritev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x0, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = dup3(r3, r2, 0x0) dup3(r4, r0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) [ 757.496606] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:47 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 757.692199] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 757.702262] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:50 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea3", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x50}}, 0x40) 14:29:50 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:29:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c000580050019000300"], 0x54}}, 0x0) 14:29:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:29:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:29:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x50}}, 0x40) 14:29:50 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 760.422925] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 760.440593] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c000580050019000300"], 0x54}}, 0x0) 14:29:50 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}, @IFLA_IPTUN_TOS={0x5, 0x5, 0x6}]}}}, @IFLA_NUM_TX_QUEUES={0x8}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x50}}, 0x40) 14:29:50 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:29:50 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 760.633561] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 760.655616] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea3", 0x99}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x30}}, 0x40) 14:29:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:29:53 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:29:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c000580050019000300000005"], 0x54}}, 0x0) 14:29:53 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:29:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:29:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x30}}, 0x40) [ 763.499698] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 763.526376] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0", 0xb2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c000580050019000300000005"], 0x54}}, 0x0) 14:29:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:29:53 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:29:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:29:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x30}}, 0x40) [ 763.714076] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:29:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @broadcast}]}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x48}}, 0x40) 14:29:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c000580050019000300000005"], 0x54}}, 0x0) [ 763.782264] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:29:53 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:29:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x40}}, 0x40) [ 763.957031] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 763.995619] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:56 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0", 0xb2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:29:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:29:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x4}}}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x9}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x6}]}, 0x40}}, 0x0) 14:29:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c00058005001900030000000500"], 0x54}}, 0x0) 14:29:56 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:29:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 766.693049] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 766.706402] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:56 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:29:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:29:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c00058005001900030000000500"], 0x54}}, 0x0) 14:29:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:29:56 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) [ 766.924403] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) [ 766.950177] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:59 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0", 0xb2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:29:59 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 14:29:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:29:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:29:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c00058005001900030000000500"], 0x54}}, 0x0) 14:29:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:29:59 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) [ 769.742445] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:29:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 769.783117] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 14:29:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:29:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:29:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:29:59 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) [ 769.978850] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) [ 769.999744] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 770.013846] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f", 0xbf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:30:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:02 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 14:30:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 772.823760] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 772.833885] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:30:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:30:02 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) [ 772.866125] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f", 0xbf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:02 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:30:02 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 14:30:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 14:30:02 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) [ 773.088015] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 773.107404] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) [ 773.118585] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) [ 773.297911] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:30:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f", 0xbf}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:05 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 14:30:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 14:30:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 14:30:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f070000000000000000", @ANYRES32, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) [ 776.119460] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:30:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:06 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 14:30:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) [ 776.340199] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) [ 776.380646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30461 comm=syz-executor.1 14:30:08 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5", 0xc5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:08 executing program 0: socket$inet6(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 14:30:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:08 executing program 0: socket$inet6(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) [ 779.136809] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30479 comm=syz-executor.1 [ 779.150758] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:30:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:09 executing program 0: socket$inet6(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) 14:30:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) [ 779.384794] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30512 comm=syz-executor.1 [ 779.403041] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:30:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5", 0xc5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:11 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) 14:30:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:11 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:12 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) 14:30:12 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 782.195599] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) [ 782.209416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30534 comm=syz-executor.1 14:30:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:12 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:12 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) [ 782.417824] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30557 comm=syz-executor.1 [ 782.418435] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:30:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5", 0xc5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:14 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:14 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/netlink\x00') preadv(r0, &(0x7f0000000980)=[{&(0x7f0000000180)=""/227, 0xe3}], 0x1, 0x0, 0x0) 14:30:15 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/netlink\x00') preadv(r0, &(0x7f0000000980)=[{&(0x7f0000000180)=""/227, 0xe3}], 0x1, 0x0, 0x0) [ 785.236120] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30576 comm=syz-executor.1 14:30:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 785.293780] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:30:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="54000000100001040000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:15 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:15 executing program 0: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 785.477238] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. [ 785.486300] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:30:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109", 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:18 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:18 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000014, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 14:30:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="54000000100001040000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="54000000100001040000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:18 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) [ 788.292217] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. [ 788.324568] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:30:18 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:18 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) [ 788.481834] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. [ 788.508775] EXT4-fs (loop5): bad geometry: block count 64 exceeds size of device (2 blocks) 14:30:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f07000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) [ 788.641939] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109", 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f07000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioprio_set$uid(0x3, 0x0, 0x0) 14:30:21 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 791.343025] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioprio_set$uid(0x3, 0x0, 0x0) 14:30:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f07000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:21 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) [ 791.551429] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109", 0xc8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:24 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 14:30:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:24 executing program 4: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f07000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:24 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x2) 14:30:24 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f07000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) [ 794.360962] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:24 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:24 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x901c41, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000040), 0xfe80) dup3(r2, r3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0x0, 0x0, 0x1}) [ 794.516573] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e334", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0xe0040000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x2000012, 0x1f4}}], 0x1, 0x100, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) socket(0x0, 0x0, 0x0) sendto$inet(r0, &(0x7f00000006c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ef922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecfa0b1a7511bf746bec66ba76b699d3a483904811c5709efa01fa13e4ddc813f76684d3d1529fea5d78b38267db0082270f62b41b50981b0313b668585ad32e8977c5f7c2dc112136b8f7392223205ad86f4a9de1cddbd119f26acc2f", 0xffffffcd, 0x11, 0x0, 0x170) 14:30:27 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f07000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:27 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) [ 797.408624] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f0700000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:27 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000040)) 14:30:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 797.596658] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e334", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f0700000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 14:30:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x0, 0x0, 0x0, 0x7}, 0x20) 14:30:30 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 14:30:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, 0x0, 0x0) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) [ 800.485106] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 800.502050] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040), 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="540000001000010400000f0700000000000000", @ANYRES32=r2, @ANYBLOB="000000000000000034001280110001006272696467655f736c617665000000001c0005800500190003000000050004"], 0x54}}, 0x0) 14:30:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) dup3(r1, r0, 0x0) [ 800.670978] netlink: 52 bytes leftover after parsing attributes in process `syz-executor.1'. 14:30:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e334", 0xca}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 14:30:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040), 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="1fffff1305f381e3753a555e7c710400000000000000b1c89fd000321ea8e702a295a9586a8efe74383bd5334981a764a697264387b4420e90320a06fa402b2beb76d76c1d136f10b6c2d8ea95249f15cd8b50b6888ab5361618aa07b301ba387615825b18b987523dc274e06187d66fa717ecf4", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:33 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000002540)=ANY=[], 0x15) dup(0xffffffffffffffff) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) close(0xffffffffffffffff) 14:30:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040), 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)) 14:30:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 803.672457] EXT4-fs (loop5): Can't read superblock on 2nd try 14:30:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)) 14:30:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) [ 803.890095] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0xcb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)) 14:30:36 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000002540)=ANY=[], 0x15) dup(0xffffffffffffffff) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) close(0xffffffffffffffff) 14:30:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="1fffff1305f381e3753a555e7c710400000000000000b1c89fd000321ea8e702a295a9586a8efe74383bd5334981a764a697264387b4420e90320a06fa402b2beb76d76c1d136f10b6c2d8ea95249f15cd8b50b6888ab5361618aa07b301ba387615825b18b987523dc274e06187d66fa717ecf4", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(0xffffffffffffffff, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) [ 806.632513] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:36 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000040)) 14:30:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) [ 806.847932] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 806.887954] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:30:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0xcb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000040)) 14:30:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:39 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000002540)=ANY=[], 0x15) dup(0xffffffffffffffff) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) close(0xffffffffffffffff) 14:30:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="1fffff1305f381e3753a555e7c710400000000000000b1c89fd000321ea8e702a295a9586a8efe74383bd5334981a764a697264387b4420e90320a06fa402b2beb76d76c1d136f10b6c2d8ea95249f15cd8b50b6888ab5361618aa07b301ba387615825b18b987523dc274e06187d66fa717ecf4", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) [ 809.641582] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 809.665825] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000040)) 14:30:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x400}], 0x0, &(0x7f0000000040)) [ 809.870249] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 809.876672] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 14:30:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x0, 0x0, 0x0) [ 810.059508] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0xcb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x0, 0x0, 0x0) 14:30:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000000040)) 14:30:42 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000002540)=ANY=[], 0x15) dup(0xffffffffffffffff) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) close(0xffffffffffffffff) 14:30:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000000)="1fffff1305f381e3753a555e7c710400000000000000b1c89fd000321ea8e702a295a9586a8efe74383bd5334981a764a697264387b4420e90320a06fa402b2beb76d76c1d136f10b6c2d8ea95249f15cd8b50b6888ab5361618aa07b301ba387615825b18b987523dc274e06187d66fa717ecf4", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0x4048ae9b, &(0x7f00000000c0)={0x0, 0x0, [0x4d0, 0x0, 0x3, 0x2, 0xda0]}) 14:30:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x0, 0x0, 0x0) [ 812.746595] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000000040)) 14:30:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4048ae9b, 0x0) [ 812.890173] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:42 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}], 0x0, &(0x7f0000000040)) 14:30:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 813.179103] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0xcb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4048ae9b, 0x0) 14:30:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f000000000000000200000002", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 14:30:45 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000002540)=ANY=[], 0x15) dup(0xffffffffffffffff) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 14:30:45 executing program 0: r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)) 14:30:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) [ 815.789502] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:45 executing program 0: r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)) 14:30:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0x4048ae9b, 0x0) 14:30:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0xcb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f000000000000000200000002", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 14:30:45 executing program 2: prlimit64(0x0, 0x0, 0x0, &(0x7f00000001c0)) 14:30:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:45 executing program 0: r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)) [ 816.069308] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:45 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x9}]}}}]}, 0x3c}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x3, 'vlan0\x00'}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 14:30:46 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000002540)=ANY=[], 0x15) dup(0xffffffffffffffff) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 14:30:46 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f000000000000000200000002", 0x1d, 0x400}], 0x0, &(0x7f0000000040)) 14:30:46 executing program 0: r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)) 14:30:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x56, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x20, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}, @exp_fastopen={0xfe, 0x4}]}}}}}}}}, 0x0) 14:30:46 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x9}]}}}]}, 0x3c}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x3, 'vlan0\x00'}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 817.018682] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0xcb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:48 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)) 14:30:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x52, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x1c, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @sack_perm={0x4, 0x2}]}}}}}}}}, 0x0) 14:30:48 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f000000000000000200000002000000008000000080000020000000", 0x2c, 0x400}], 0x0, &(0x7f0000000040)) 14:30:48 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {0x3}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_MIIMON={0x8, 0x3, 0x9}]}}}]}, 0x3c}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={0x3, 'vlan0\x00'}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 14:30:48 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000002540)=ANY=[], 0x15) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 14:30:48 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x18, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}]}}}}}}}}, 0x0) [ 819.002007] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:48 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f000000000000000200000002000000008000000080000020000000", 0x2c, 0x400}], 0x0, &(0x7f0000000040)) 14:30:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0xcb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:48 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)) 14:30:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffffffd) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "0a3ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 14:30:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0xcb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:49 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)) [ 819.299832] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:49 executing program 0: getpid() prlimit64(0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)) 14:30:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000640)='\f', 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b6a, &(0x7f00000000c0)) 14:30:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0xcb}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:49 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0xffffffffffffffff, 0x6c}, &(0x7f0000001fee)='R\x05rist\xe3cusgrVid:De', 0x0) 14:30:49 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 14:30:49 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f000000000000000200000002000000008000000080000020000000", 0x2c, 0x400}], 0x0, &(0x7f0000000040)) 14:30:49 executing program 0: getpid() prlimit64(0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)) 14:30:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000640)='\f', 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b6a, &(0x7f00000000c0)) 14:30:49 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0xffffffffffffffff, 0x6c}, &(0x7f0000001fee)='R\x05rist\xe3cusgrVid:De', 0x0) 14:30:50 executing program 0: getpid() prlimit64(0x0, 0x0, &(0x7f0000000140), &(0x7f00000001c0)) 14:30:50 executing program 2: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0xffffffffffffffff, 0x6c}, &(0x7f0000001fee)='R\x05rist\xe3cusgrVid:De', 0x0) [ 820.244396] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:50 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000640)='\f', 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b6a, &(0x7f00000000c0)) 14:30:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c464", 0x33, 0x400}], 0x0, &(0x7f0000000040)) 14:30:50 executing program 0: r0 = getpid() prlimit64(r0, 0x0, 0x0, &(0x7f00000001c0)) [ 820.493425] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000004c0)='asymmetric\x00', 0x0, &(0x7f0000000640)='\f', 0x1, 0x0) ioctl$TIOCL_SETSEL(r0, 0x4b6a, &(0x7f00000000c0)) 14:30:52 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r3 = dup(r0) preadv2(r3, &(0x7f0000000040)=[{&(0x7f0000000240)=""/114, 0x72}], 0x1, 0x0, 0x0, 0x0) 14:30:52 executing program 0: r0 = getpid() prlimit64(r0, 0x0, 0x0, &(0x7f00000001c0)) 14:30:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c464", 0x33, 0x400}], 0x0, &(0x7f0000000040)) 14:30:52 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 14:30:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000100)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a505000000007751e8ba639a6788a341cca555fedbe9d8f3b423cdacfa7e32fe0231368b2264f9dc3f45f9f65515b0e1a38d8665522be18bd10a48b043ccc42646d25d7fc2506a0f68a7d06d7535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d64e7cc957d77578f4c35235138d5521f9453559c35da860e8efbc6f2b2a3e3173d5661cfeec79c66c54c3000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r0}, 0x10) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r2, r1, 0x0, 0x0, 0x0}, 0x30) 14:30:52 executing program 0: r0 = getpid() prlimit64(r0, 0x0, 0x0, &(0x7f00000001c0)) [ 822.725012] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c464", 0x33, 0x400}], 0x0, &(0x7f0000000040)) 14:30:52 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='reno\x00', 0x5) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200187ec, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x200092c4}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x1000001bd) 14:30:52 executing program 0: r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000140), 0x0) [ 823.008590] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:52 executing program 0: r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000140), 0x0) 14:30:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:53 executing program 0: r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000140), 0x0) 14:30:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r3 = dup(r0) preadv2(r3, &(0x7f0000000040)=[{&(0x7f0000000240)=""/114, 0x72}], 0x1, 0x0, 0x0, 0x0) 14:30:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ff", 0x37, 0x400}], 0x0, &(0x7f0000000040)) 14:30:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:53 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 14:30:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000186000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f00007a3000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 14:30:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 823.565749] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ff", 0x37, 0x400}], 0x0, &(0x7f0000000040)) [ 823.893155] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:53 executing program 4: mkdir(0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000002cc0), 0x1a3, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) 14:30:53 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000186000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f00007a3000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 14:30:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ff", 0x37, 0x400}], 0x0, &(0x7f0000000040)) 14:30:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r3 = dup(r0) preadv2(r3, &(0x7f0000000040)=[{&(0x7f0000000240)=""/114, 0x72}], 0x1, 0x0, 0x0, 0x0) 14:30:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 824.411768] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000040)) [ 824.811773] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:54 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 14:30:54 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000186000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f00007a3000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 14:30:54 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000186000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f00007a3000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 14:30:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000040)) 14:30:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000186000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f00007a3000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 14:30:55 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r3 = dup(r0) preadv2(r3, &(0x7f0000000040)=[{&(0x7f0000000240)=""/114, 0x72}], 0x1, 0x0, 0x0, 0x0) 14:30:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000186000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f00007a3000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) [ 825.545269] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53", 0x39, 0x400}], 0x0, &(0x7f0000000040)) [ 825.895582] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:55 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = socket(0x2, 0x803, 0xff) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) [ 826.275772] audit: type=1804 audit(1600612256.057:157): pid=31608 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir637341128/syzkaller.mKXXaN/937/bus" dev="sda1" ino=17197 res=1 14:30:56 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 14:30:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000186000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f00007a3000/0x2000)=nil) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r0 = gettid() process_vm_writev(r0, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 14:30:56 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000000040)) 14:30:56 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) preadv2(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)=""/114, 0x72}], 0x1, 0x0, 0x0, 0x0) [ 826.434127] audit: type=1804 audit(1600612256.227:158): pid=31609 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir637341128/syzkaller.mKXXaN/937/bus" dev="sda1" ino=17197 res=1 [ 826.597058] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:56 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f00000037c0)=[{{&(0x7f0000000000)={0x2, 0x0, @empty}, 0x10, &(0x7f0000002200)=[{&(0x7f0000000100)="69ca", 0x2}], 0x1}}], 0x1, 0x0) 14:30:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000000040)) 14:30:58 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 14:30:58 executing program 4: openat$bsg(0xffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x2, 0x0) sendfile(r1, r0, 0x0, 0x7ffff003) 14:30:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) preadv2(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)=""/114, 0x72}], 0x1, 0x0, 0x0, 0x0) 14:30:58 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) [ 828.402439] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:58 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="1f5583624999c4665398664c3fd64362f39caf1701d25c2fd6d42bce84c2e238b5eae719fd6321452d791cc0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c6138b7c754ff41c5d3cd1b6e0fe6ea2cd36efecfe2dd9f9ec1e7b23b2ede490fd56769cfa6c3a468000000c6f5512db3", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a}], 0x0, &(0x7f0000000040)) 14:30:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x0, 0x3, 0x2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000003b00)={'gre0\x00', &(0x7f0000003a80)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@noop, @rr={0x7, 0xf, 0x0, [@private, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr]}, @end, @lsrr={0x83, 0x2b, 0x0, [@loopback, @private, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev, @multicast2, @multicast1, @multicast1, @private, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000000)={'gre0\x00', 0x0, 0x0, 0x4c00, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local}}}}) [ 828.587562] ptrace attach of "/root/syz-executor.0"[31668] was attempted by "/root/syz-executor.0"[31670] [ 828.650732] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 14:30:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:30:58 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 14:30:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) preadv2(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)=""/114, 0x72}], 0x1, 0x0, 0x0, 0x0) 14:30:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15e, 0x400}], 0x0, &(0x7f0000013d00)) [ 829.053690] ================================================================================ [ 829.062689] UBSAN: Undefined behaviour in fs/ext4/super.c:3763:25 [ 829.068950] shift exponent 32770 is too large for 32-bit type 'int' [ 829.075379] CPU: 0 PID: 31703 Comm: syz-executor.0 Not tainted 4.19.146-syzkaller #0 [ 829.083280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 829.092646] Call Trace: [ 829.095364] dump_stack+0x22c/0x33e [ 829.099078] ubsan_epilogue+0xe/0x3a [ 829.102840] __ubsan_handle_shift_out_of_bounds.cold+0x1c4/0x250 [ 829.109069] ext4_fill_super.cold+0x33b/0x4ea [ 829.113616] ? vsnprintf+0x2cc/0x14f0 [ 829.117439] ? pointer+0x850/0x850 [ 829.121043] ? lock_downgrade+0x750/0x750 [ 829.125206] ? ext4_calculate_overhead+0x12f0/0x12f0 [ 829.130321] ? snprintf+0xbb/0xf0 [ 829.133844] ? __mutex_add_waiter+0x160/0x160 [ 829.138439] ? set_blocksize+0x163/0x3f0 [ 829.142586] mount_bdev+0x2fc/0x3b0 [ 829.146229] ? ext4_calculate_overhead+0x12f0/0x12f0 [ 829.151354] mount_fs+0xa3/0x318 [ 829.154820] vfs_kern_mount.part.0+0x68/0x470 [ 829.159328] do_mount+0x51c/0x2f10 [ 829.162929] ? do_raw_spin_unlock+0x171/0x240 [ 829.167501] ? check_preemption_disabled+0x41/0x2b0 [ 829.172534] ? copy_mount_string+0x40/0x40 [ 829.176857] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 829.181716] ? copy_mount_options+0x261/0x370 [ 829.186249] ksys_mount+0xcf/0x130 [ 829.189797] __x64_sys_mount+0xba/0x150 [ 829.193790] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 829.198434] do_syscall_64+0xf9/0x670 [ 829.202247] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 829.209183] RIP: 0033:0x46004a [ 829.212385] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 fd 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 da 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 829.231307] RSP: 002b:00007f629ff91a88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 829.239046] RAX: ffffffffffffffda RBX: 00007f629ff91b20 RCX: 000000000046004a [ 829.246357] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f629ff91ae0 14:30:59 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 829.253637] RBP: 00007f629ff91ae0 R08: 00007f629ff91b20 R09: 0000000020000000 [ 829.260915] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 829.268887] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020013d00 [ 829.276189] ================================================================================ [ 829.318537] EXT4-fs (loop0): bad s_min_extra_isize: 14874 [ 829.435736] EXT4-fs (loop0): bad s_min_extra_isize: 14874 14:30:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15e, 0x400}], 0x0, &(0x7f0000013d00)) [ 829.618700] EXT4-fs (loop0): bad s_min_extra_isize: 14874 14:31:01 executing program 4: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x68}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 14:31:01 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) open$dir(0x0, 0x44d80, 0x4) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 14:31:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000270000000f00000000000000028000000000000000800000008000002000000028c4645f28c4645f0100ffff53ef01004bedffff27c4645f000000000000000001000000000000000b0000000004179b66a5004c0f4cddc961199b60aafd56c21cdef99438dea22037a150d156b9ee9f1a83f38e39ca8ae203ca414741c25f46079cabd0228c365092aaa762bed5511dea8363e74283f3aa6c5c745def504598888ac04acdd3a1533c1dbc00bcc5ecf287e91af1e5b5b89a72f81f7eacc0425b8e7d8c1092abd9a6bbd23fb722711e637484487fc3c78761bf1d0aabb5c2b2d39fbbeb23fae4f9ac89d57dc1ce953b0a3a1d8010d3f3f86168b903b34fb732495e65a03696fd82bf125c518225198d0cb6207bedced15823d953e2d6ac269c8501ccf93ff78e19ff376e1465b00efae7a93ab2e21fbac154e9ff12795372cedc42dbb2a454bb24338c027bf8e1f452201a3a", 0x15e, 0x400}], 0x0, &(0x7f0000013d00)) 14:31:01 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000029c4645f29c4645f0100ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 14:31:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) socket$netlink(0x10, 0x3, 0x0) r2 = dup(r0) preadv2(r2, &(0x7f0000000040)=[{&(0x7f0000000240)=""/114, 0x72}], 0x1, 0x0, 0x0, 0x0) 14:31:01 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0x4ea00) [ 831.483952] ptrace attach of "/root/syz-executor.4"[31750] was attempted by "/root/syz-executor.4"[31752] [ 831.514235] EXT4-fs (loop0): bad s_min_extra_isize: 14874 14:31:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:31:01 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='lock_acquire\x00', r1}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[], 0x4ea00) 14:31:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB="840000001000390400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800128008000100736974000c00028005000a0001"], 0x84}}, 0x0) 14:31:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15e, 0x400}], 0x0, &(0x7f0000013d00)) 14:31:01 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000740)={[{@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@gid={'gid'}}]}) 14:31:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(r0) getsockopt$inet6_tcp_int(r3, 0x6, 0x6, 0x0, &(0x7f0000000040)) [ 831.941365] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.5'. [ 831.979797] EXT4-fs (loop0): bad s_min_extra_isize: 14874 14:31:01 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 14:31:01 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15e, 0x400}], 0x0, &(0x7f0000013d00)) 14:31:01 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000000c0)) 14:31:02 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000000c0)) [ 832.191224] ISOFS: Unable to identify CD-ROM format. 14:31:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) socket$netlink(0x10, 0x3, 0x0) r2 = dup(r0) preadv2(r2, &(0x7f0000000040)=[{&(0x7f0000000240)=""/114, 0x72}], 0x1, 0x0, 0x0, 0x0) 14:31:02 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15e, 0x400}], 0x0, &(0x7f0000013d00)) 14:31:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:31:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000000c0)) 14:31:04 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000740)={[{@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@gid={'gid'}}]}) 14:31:04 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15e, 0x400}], 0x0, &(0x7f0000013d00)) 14:31:04 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 14:31:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) socket$netlink(0x10, 0x3, 0x0) r2 = dup(r0) preadv2(r2, &(0x7f0000000040)=[{&(0x7f0000000240)=""/114, 0x72}], 0x1, 0x0, 0x0, 0x0) 14:31:04 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000000c0)) 14:31:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="200000004000000003000000270000000f00000000000000028000000000000000800000008000002000000028c4645f28c4645f0100ffff53ef01004bedffff27c4645f000000000000000001000000000000000b0000000004179b66a5004c0f4cddc961199b60aafd56c21cdef99438dea22037a150d156b9ee9f1a83f38e39ca8ae203ca414741c25f46079cabd0228c365092aaa762bed5511dea8363e74283f3aa6c5c745def504598888ac04acdd3a1533c1dbc00bcc5ecf287e91af1e5b5b89a72f81f7eacc0425b8e7d8c1092abd9a6bbd23fb722711e637484487fc3c78761bf1d0aabb5c2b2d39fbbeb23fae4f9ac89d57dc1ce953b0a3a1d8010d3f3f86168b903b34fb732495e65a03696fd82bf125c518225198d0cb6207bedced15823d953e2d6ac269c8501ccf93ff78e19ff376e1465b00efae7a93ab2e21fbac154e9ff12795372cedc42dbb2a454bb24338c027bf8e1f452201a3a", 0x15e, 0x400}], 0x0, &(0x7f0000013d00)) [ 835.062756] ISOFS: Unable to identify CD-ROM format. 14:31:04 executing program 4: ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000000c0)) 14:31:05 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000740)={[{@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@gid={'gid'}}]}) 14:31:05 executing program 4: ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000000c0)) 14:31:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15e, 0x400}], 0x0, &(0x7f0000013d00)) [ 835.464777] ISOFS: Unable to identify CD-ROM format. 14:31:07 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0, 0xffffffffffffff0f}, {0x0}, {&(0x7f0000000280)="1f5583624999c4665398664cc4878a29fc1df4c0c9045e3fd64362f39caf1701d25c2fd6d499b05357e238b594cc0aea7918c0576c8624862bd395fea6432d69e5cc27d7b0ca298f52e4be0721915e61ca9791d9da035fcb039c7c61381fb7c754ff4185d3cd1b6e0fe6ea2cd36efecfe2dd8b38b19f9ec1e7b23b2ede490fd5616911df2cbc32f508a114b8e0c2b0630d4e93c14ca5084ea34ff0eede08e77214fcf0f1f797f3ee07ab431c92b69183c5d0ab0c192a85821723c91d2b5a7f0f0b1db42cc5f5f109e33417", 0x88}], 0xe5e, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:31:07 executing program 4: ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f00000000c0)) 14:31:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="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", 0x15e, 0x400}], 0x0, &(0x7f0000013d00)) 14:31:07 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000740)={[{@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@gid={'gid'}}]}) 14:31:07 executing program 1: pipe2(0x0, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mlockall(0x1) ioctl$KVM_SET_XCRS(0xffffffffffffffff, 0x4188aea7, &(0x7f00000004c0)=ANY=[@ANYBLOB="0800000051050000190200000000000009000000000000000100000000000000070000000000000003000000000000d899000000000000000500000000000000090000000000000001000000000000000200000091380000000000000101000000000000e800000000000000018000000000000006000000"]) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000200)={0x2, 0x1, 0x0, 0x0, &(0x7f0000000140)=""/137}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x801100, 0x0, 0x0, 0x0, 0x2) 14:31:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = dup(r0) preadv2(r2, &(0x7f0000000040)=[{&(0x7f0000000240)=""/114, 0x72}], 0x1, 0x0, 0x0, 0x0) 14:31:07 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000000c0)) 14:31:07 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000000c0)) 14:31:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000013d00)) [ 838.140757] ISOFS: Unable to identify CD-ROM format. 14:31:08 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000000c0)) 14:31:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000013d00)) 14:31:08 executing program 5: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000740)={[{@iocharset={'iocharset', 0x3d, 'iso8859-1'}}, {@gid={'gid'}}]})