f, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000", 0x1a, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:50 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8f, 0x9}) [ 344.429809] ufs: Invalid option: "@Zwr@gB!٥" or missing value [ 344.436543] ufs: wrong mount options 06:10:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8f, 0x9}) 06:10:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8f, 0x9}) [ 344.607688] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 344.646717] EXT4-fs (loop3): get root inode failed [ 344.653858] EXT4-fs (loop3): mount failed 06:10:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8f, 0x9}) [ 344.771797] ufs: Invalid option: "@Zwr@gB!٥" or missing value 06:10:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 344.832386] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 344.835058] ufs: wrong mount options 06:10:51 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x800013, &(0x7f0000000000)=ANY=[@ANYBLOB="ffc805961222de84a2678b66ab8e9988b27ced5d177a26ebc7219cd1a3a640822b3426e8c11b8fa48ef05af02389cb65f3cb8f05b04f80131358e6448cd03c1176576c5ba439f4e929cab93df59858515e231c3522a86a7bb254c8fbeffe349662adc55866712cea188de3aabe3a129154c823c7cf9d27232f40c5e2d330c51bf73ab966dced00ab5f9e1f63e4c6e5bd56668ed866082d9a80090cc50c836de0ce16a6437ddb3a64be8f0bbe5ac68af81d636a1fe71302d5d1d8866a45f5ce1c8d08fc0600"/218]) 06:10:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8f, 0x9}) 06:10:51 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(0x0, 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 345.017646] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:10:51 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8f, 0x9}) [ 345.117165] ufs: Invalid option: ""ބgf|]z&!ѣ@+4&Z#eˏOXD<vWl[9)ʹ=XQ^#5"j{T4bXfq" or missing value 06:10:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 345.213732] ufs: wrong mount options 06:10:51 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8f, 0x9}) [ 345.261668] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 345.285578] EXT4-fs (loop3): mount failed [ 345.405475] ufs: Invalid option: ""ބgf|]z&!ѣ@+4&Z#eˏOXD<vWl[9)ʹ=XQ^#5"j{T4bXfq" or missing value [ 345.420409] ufs: wrong mount options 06:10:52 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(0x0, 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:52 executing program 2: socketpair(0x1f, 0x5, 0x78e, &(0x7f0000000000)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_REAPURBNDELAY(r1, 0x4008550d, &(0x7f00000000c0)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x3e9280, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000080)={0x9, 0x9, 0xfff, 0x8, 0xb, 0xf4, 0x20}, 0xc) 06:10:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:52 executing program 1: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8f, 0x9}) [ 345.765250] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:10:52 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000000)=0xfffffeff) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) 06:10:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_RESIZEX(r0, 0x560a, 0x0) 06:10:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_RESIZEX(r0, 0x560a, 0x0) [ 346.028799] ufs: You didn't specify the type of your ufs filesystem [ 346.028799] [ 346.028799] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 346.028799] [ 346.028799] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:10:52 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(0x0, 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 346.110815] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 346.130900] EXT4-fs (loop3): mount failed [ 346.151202] ufs: ufs_fill_super(): bad magic number 06:10:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_RESIZEX(r0, 0x560a, 0x0) 06:10:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f0000000000000400", 0x1c, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 346.315779] EXT4-fs (loop4): unsupported descriptor size 0 06:10:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 06:10:53 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x10000000000000, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000040)=ANY=[]) r0 = socket$inet6(0xa, 0x2, 0x0) setxattr$security_evm(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000200)=@v2={0x3, 0x1, 0xd, 0x1, 0x68, "1116f20bb35560adce6dccb92f862016364427ecff8f951fbcb25069da48430a1b9a6f961d8d7152ac91cbbb583a6799e7ab8723aee4c35da5453e366539f4deda9e89dfc5c40d325eb9630e77e34b517d391b4dadf1057969905aa670190ff3f83bbebb957b1562"}, 0x71, 0x1) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f000004c000)=0x23, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x2b) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'veth0\x00', {'veth0\x00'}}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2000c0, 0x0) accept$ax25(r1, &(0x7f00000000c0)={{0x3, @bcast}, [@bcast, @default, @bcast, @netrom, @null, @remote, @remote, @default]}, &(0x7f0000000140)=0x48) 06:10:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 06:10:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 06:10:53 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 346.699278] ufs: ufs was compiled with read-only support, can't be mounted as read-write 06:10:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8f}) 06:10:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 346.895221] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 346.949368] ufs: ufs was compiled with read-only support, can't be mounted as read-write [ 346.996619] EXT4-fs (loop3): mount failed 06:10:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8f}) 06:10:53 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) prctl$PR_SVE_GET_VL(0x33, 0x1306d) 06:10:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:53 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8f}) [ 347.206444] EXT4-fs (loop4): unsupported descriptor size 0 06:10:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:53 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 347.396537] ufs: You didn't specify the type of your ufs filesystem [ 347.396537] [ 347.396537] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 347.396537] [ 347.396537] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:10:54 executing program 1: [ 347.479375] ufs: ufs_fill_super(): bad magic number 06:10:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:54 executing program 1: 06:10:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000740)=0x5, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2d}}}, 0x0, 0x0, 0xf, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a78f00"}, 0xd8) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) r1 = syz_genetlink_get_family_id$tipc2(0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r1], 0xc63b9e35) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000040)={0x198, r1, 0x4, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x30, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK={0x80, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1ff}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xc5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f}]}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1f}, @TIPC_NLA_CON_NODE={0x8}]}]}, @TIPC_NLA_SOCK={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x110459d1}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x101}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9a0}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x4000}, 0x40010) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) [ 347.926288] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated 06:10:54 executing program 1: 06:10:54 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:54 executing program 1: [ 347.974097] EXT4-fs (loop3): get root inode failed [ 347.980494] EXT4-fs (loop3): mount failed [ 347.993873] EXT4-fs (loop4): unsupported descriptor size 0 06:10:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:54 executing program 1: 06:10:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 348.143076] ufs: You didn't specify the type of your ufs filesystem [ 348.143076] [ 348.143076] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 348.143076] [ 348.143076] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:10:54 executing program 1: [ 348.269577] ufs: ufs_fill_super(): bad magic number 06:10:55 executing program 1: close(0x3) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0x5) 06:10:55 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 348.553295] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 348.620155] EXT4-fs (loop3): get root inode failed [ 348.631145] EXT4-fs (loop3): mount failed 06:10:55 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1000000", @ANYRES32=0x0, @ANYBLOB="ff7f000040000000140012800a00010076786c616e00000004000280080004"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 06:10:55 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000000)={[], [{@appraise_type='appraise_type=imasig'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) ioctl$DRM_IOCTL_MODE_CURSOR(0xffffffffffffffff, 0xc01c64a3, &(0x7f0000000080)={0x1, 0x8, 0x7ff, 0x8000b7, 0x0, 0x5, 0x2}) 06:10:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 348.763887] EXT4-fs (loop4): unsupported descriptor size 0 06:10:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000100)=ANY=[], 0x1c) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 06:10:55 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 348.925463] ufs: Invalid option: "appraise_type=imasig" or missing value [ 348.935155] ufs: wrong mount options [ 349.017735] ufs: Invalid option: "appraise_type=imasig" or missing value [ 349.036391] ufs: wrong mount options [ 349.071839] EXT4-fs error (device loop3): ext4_fill_super:4448: inode #2: comm syz-executor.3: iget: root inode unallocated [ 349.132374] EXT4-fs (loop3): get root inode failed [ 349.157740] EXT4-fs (loop3): mount failed 06:10:55 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) r0 = socket$inet6(0xa, 0x6, 0x3) sendmmsg(0xffffffffffffffff, &(0x7f0000002940)=[{{&(0x7f0000000100)=@tipc=@name={0x1e, 0x2, 0x0, {{0x42}, 0x2}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000180)="08937618dcf9ec3549cb99c8e558c5f0edc387e49c837c9003", 0x19}, {&(0x7f0000000940)="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", 0x1000}, {&(0x7f00000001c0)="db0c28b726d827985236eb5444ba26a319231906015bbdcebe73f83cda3fdb5ae9243e3e8747a4c986698f46adf1803917b34dc045939cd71e4dbad99160ee71a6d1379614a4da5f7d2946dd084c8aa544cca853dd3c3176bdc7d0aeb5b909b3cd8b20ae4fc03514d53d9dea44d499c138676a320b0ce27af62bad1df39f5f982ba36ec670d50bc9c51588f9251d3018a4aa32dbb3100c3c64910e6ff3e4d58c8f8ba13b9ce5f527d690a9018e3914", 0xaf}, {&(0x7f0000001940)="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", 0x1000}], 0x4, &(0x7f0000000500)=[{0xe8, 0x1, 0x6, "d28abec7312ff6277dad47f365a503b2ed509bca0301b4ed0b1c058134af0cb1093715adbb144800bb597aae5eac2727f41e1dd79ffb8d1929b65d55de056ed28cc77be3dbdecdb951aeaf9511452f2290935c0ef3570fe4405b9f6782a40f472540e6e2963580843c61c2bf9b44cf13d54cf79644ce6bd9d7893e2106f6848a374a613218aaa6d885e22a6fc159fbd02ff1d5b0ce34286cca026e59d8b1278ec21e047f0857c6bd185aa873cd4bf222e433cf0b2f5ef8474a0f19f6a9430f15f7b3e0e393b325ead34fd174d6c8931c1081a5767dd23586"}, {0xc8, 0x116, 0x5f, "edbb3c2a186b520a9abe6f99a658db090387084df72c3bd44717c5fa07f3aa1205c54877748ffb85125258d338cb73e780ae949010a6eee19cdffafef8f0b93f56cb943186d5244bb7c173ca0ca0689aeaa09bc723ffe8f68535f7855f64c86d1ea34b5f10b513bb429f59c64f97a30906088a21171aa849034c8e0a8323e3f6a835192537bbdd7583554fc98616d2c88dd0b3911a5634dfef389c9addaac9fbe16d56027157137842d1b019fe4cb06880d8a2595f"}, {0xc0, 0x103, 0x65676f68, "424adc894a31fb133edd5301b93f087dcd3393eece52a12b1ba3aa154d67d09cc51f6f803923ec95893ba922656e7deaef56b9e7fabc778e81996ff6ba819fe75574d662db8b5315875d5cde7f76f2f60373e94121663385cce80942d16cdf9f44086ae78d5484091ae8b4194a2bab61bd0962403916753959dcf818920f1092be1922f28eb1a8053512233fec1c7ca0d9c6f77aae7241a3f2bf662a94d852915187a4aa7779db9aba76c8a54980"}], 0x270}}, {{&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @multicast2}, 0x4, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="b9fb8268f66f877fb9ceadf27eb1a43ce17a2f8b474d92f4070e673b87ae0768d35d02b206cf50ef9dea440bef4042387ec33597efbf8dba2ff5538a1322b500689a415a1bd3a9744e5d91862fa777cdd49cdc3b1014566fd28029a954b747bd736e1fc4efa90cb157e3303a8cb3e2d8a561dce6d73daf0e5e1c5d0e6c595569ffb715712f6427ea53226090d0649a01", 0xff90}, {&(0x7f0000000780)="adfe5096340cdad61702a9924adb826f956544975adca587d04f35c36796e4d82da859a6b8441802146ce1da4a4b9a702d1be19f897dc379f18e3fd5a2ad21dbaa0ec9e8872b81efd81f05d4b0f7c4f5df84cd8e40aebe40aaedea05f76c145d43b28c8da9fa6687f3d3975913f96a35ad2e789df46ed38a89c8849cbff58168a10b42cf9735cc8aef91d877f4d385833693d16fa90fb0", 0x97}, {&(0x7f0000000840)="15b88a8bb654aae720f587aa7a5fc7603e0ac94f508cc268a251a71063d543c2b0bd93ab319523c871d51acc62d6d457dfc1751984055c13b26eb641fcc2a78e2cf749b1311ddf309dec578ee02e6135a0f1bf2ba61b1bef550be2a24deaafb09774f91415047c41cc294659d35b837c66eed5aaf02e062be940eceef4d5938e902b2bb9d23df0", 0x87}], 0x3}}], 0x2, 0x4004000) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x140c, 0x200, 0x70bd26, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) 06:10:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000100)=ANY=[], 0x1c) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 06:10:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 349.364604] EXT4-fs (loop4): unsupported descriptor size 0 [ 349.376249] ufs: You didn't specify the type of your ufs filesystem [ 349.376249] [ 349.376249] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 349.376249] [ 349.376249] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 349.415426] ufs: ufs_fill_super(): bad magic number 06:10:56 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000000)=ANY=[@ANYBLOB="80985abe56c66c06566f86f1ea105704f0168ca862a14cf253f21f181aac017ac052661400090000000000000e00c0c92499184a046462000000"]) 06:10:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:56 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 349.838564] ufs: Invalid option: "ZVlVoWbLSzRf" or missing value [ 349.971975] ufs: wrong mount options 06:10:56 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:56 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) syz_init_net_socket$ax25(0x3, 0x5, 0x6) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd, 0x1, 'fq_codel\x00'}, {0xc, 0x2, [@TCA_FQ_CODEL_ECN={0x8, 0x2}]}}]}, 0x40}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r7 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000300)=@newqdisc={0x40, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd, 0x1, 'fq_codel\x00'}, {0xc, 0x2, [@TCA_FQ_CODEL_ECN={0x8, 0x2}]}}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x14000840}, 0x1) 06:10:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 350.496433] EXT4-fs (loop4): unsupported descriptor size 0 [ 350.500971] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 350.527160] EXT4-fs (loop3): group descriptors corrupted! 06:10:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 350.608590] ufs: You didn't specify the type of your ufs filesystem [ 350.608590] [ 350.608590] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 350.608590] [ 350.608590] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:10:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 351.019336] ufs: ufs_fill_super(): bad magic number [ 351.105062] EXT4-fs (loop4): unsupported descriptor size 0 [ 351.120973] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 351.136926] EXT4-fs (loop3): group descriptors corrupted! 06:10:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:10:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 351.151513] ufs: You didn't specify the type of your ufs filesystem [ 351.151513] [ 351.151513] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 351.151513] [ 351.151513] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 351.185628] ufs: ufs_fill_super(): bad magic number 06:10:57 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:10:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:57 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:57 executing program 2: ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(0xffffffffffffffff, 0xc0a85322, &(0x7f0000000040)) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000100)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000000)={0x12}) 06:10:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 351.682827] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 351.716631] ufs: You didn't specify the type of your ufs filesystem [ 351.716631] [ 351.716631] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 351.716631] [ 351.716631] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 351.763121] EXT4-fs (loop4): unsupported descriptor size 0 [ 351.769296] EXT4-fs (loop3): group descriptors corrupted! 06:10:58 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 351.814302] ufs: ufs_fill_super(): bad magic number 06:10:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 351.917267] ufs: You didn't specify the type of your ufs filesystem [ 351.917267] [ 351.917267] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 351.917267] [ 351.917267] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:10:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 352.182781] ufs: ufs_fill_super(): bad magic number 06:10:58 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:10:59 executing program 2: geteuid() r0 = syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000040)=ANY=[@ANYBLOB="73655102144900050000000000000041595f52457b1f2c00aa"]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$addseals(r0, 0x409, 0x4) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000000)='./file0\x00', 0xc6) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000080)) ioctl$KDMKTONE(r2, 0x4b30, 0x1ff) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)=0x0) r5 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r6) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f00000001c0)={0x80, 0x6, {r4}, {r6}, 0x3, 0x7f}) 06:10:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:10:59 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 352.607753] EXT4-fs (loop4): unsupported descriptor size 0 [ 352.692507] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 352.722765] ufs: Invalid option: "seQI" or missing value [ 352.736470] EXT4-fs (loop3): group descriptors corrupted! [ 352.748611] ufs: wrong mount options 06:10:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:10:59 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f0000000040)={0x0, 0x2, 0x69702837, [], &(0x7f0000000000)=0x6}) 06:10:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:10:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 353.030436] ufs: You didn't specify the type of your ufs filesystem [ 353.030436] [ 353.030436] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 353.030436] [ 353.030436] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 353.046220] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 06:10:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:10:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 353.115639] ufs: ufs_fill_super(): bad magic number [ 353.154030] EXT4-fs (loop4): unsupported descriptor size 0 06:10:59 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:10:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 353.322281] ufs: You didn't specify the type of your ufs filesystem [ 353.322281] [ 353.322281] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 353.322281] [ 353.322281] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 353.351273] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:10:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 353.396877] EXT4-fs (loop3): group descriptors corrupted! [ 353.485348] ufs: ufs_fill_super(): bad magic number 06:11:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {0x0, 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:00 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 354.085904] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 354.096867] EXT4-fs (loop3): group descriptors corrupted! 06:11:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 354.243049] EXT4-fs (loop4): unsupported descriptor size 0 06:11:00 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 354.736142] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:11:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:01 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 354.777575] EXT4-fs (loop3): group descriptors corrupted! [ 354.884520] EXT4-fs (loop4): unsupported descriptor size 0 06:11:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:01 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 355.313550] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 06:11:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 355.404825] EXT4-fs (loop3): group descriptors corrupted! 06:11:02 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 355.446344] EXT4-fs (loop4): unsupported descriptor size 0 06:11:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:02 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:02 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x0, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:02 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 356.366932] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 356.410681] EXT4-fs (loop4): unsupported descriptor size 0 [ 356.440145] EXT4-fs (loop3): group descriptors corrupted! 06:11:03 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:03 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x0, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:03 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:03 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 356.998054] EXT4-fs (loop4): unsupported descriptor size 0 06:11:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 357.169968] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 357.193404] EXT4-fs (loop3): group descriptors corrupted! 06:11:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:03 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x0, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:03 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:04 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 357.773696] EXT4-fs (loop4): unsupported descriptor size 0 [ 357.812680] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 357.858152] EXT4-fs (loop3): group descriptors corrupted! 06:11:04 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:04 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:04 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 358.496475] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 358.510103] EXT4-fs (loop3): group descriptors corrupted! 06:11:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 358.600480] EXT4-fs (loop4): unsupported descriptor size 0 06:11:05 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r1, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:05 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 359.180216] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 359.191819] EXT4-fs (loop4): unsupported descriptor size 0 [ 359.217366] EXT4-fs (loop3): group descriptors corrupted! 06:11:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 359.876308] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 359.916699] EXT4-fs (loop3): group descriptors corrupted! 06:11:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:06 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 360.253436] EXT4-fs (loop4): unsupported descriptor size 0 06:11:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 360.440732] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 360.504602] EXT4-fs (loop3): group descriptors corrupted! [ 360.509391] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 06:11:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:07 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 360.771839] EXT4-fs (loop4): unsupported descriptor size 0 06:11:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(0x0, 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 361.409435] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 361.418633] EXT4-fs (loop3): group descriptors corrupted! 06:11:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:08 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 361.615007] EXT4-fs (loop4): unsupported descriptor size 0 06:11:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 362.095797] EXT4-fs (loop4): unsupported descriptor size 0 06:11:08 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 362.178641] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 362.214662] EXT4-fs (loop3): group descriptors corrupted! 06:11:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, 0x0) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:09 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 362.888410] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 362.949397] EXT4-fs (loop3): group descriptors corrupted! [ 362.970618] EXT4-fs (loop4): unsupported descriptor size 0 06:11:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x10, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, 0x0) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:09 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:09 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 363.713394] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 363.756487] EXT4-fs (loop3): group descriptors corrupted! 06:11:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, 0x0) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:10 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 364.074348] EXT4-fs (loop4): unsupported descriptor size 0 06:11:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 364.678397] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 06:11:11 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 364.893010] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 364.939724] EXT4-fs (loop3): group descriptors corrupted! 06:11:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 365.464627] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 365.495239] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 06:11:12 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 365.521459] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 365.558330] EXT4-fs (loop3): group descriptors corrupted! 06:11:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:12 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 366.016182] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 06:11:12 executing program 2: ioctl$VIDIOC_G_MODULATOR(0xffffffffffffffff, 0xc0445636, &(0x7f0000000280)={0xfffffffa, "523dc4654c99aca38672951b27909be00ace63aa8f8f6d816bbadd26d1a5360b", 0x40, 0x7fff, 0x0, 0x1, 0x4}) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f00000001c0)=ANY=[@ANYBLOB="8b6deba2f7c4c1276d5ba236151c2f5364058b37b61f20d7263e23470e5e5371cd7e47448a064770025dc480f1727c2e8856da84c44d1aea57593b5189ca62396b179b4e96d1c2cf6970328cd1a601ba43e050af561a7e6d09c95a3b2c39196a79509a17e7802fc725c9dc673ac386af1c7838e647d205d203780616491d5b8b1bf75422a3b001d60cbf90945c0b8710219068af52f5d7d6d1c8fc3d27f54c0c"]) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@qipcrtr, &(0x7f0000000080)=0x80) sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xab4420a901cf65f1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004}, 0x4008880) [ 366.161630] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 366.170966] EXT4-fs (loop3): group descriptors corrupted! 06:11:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 366.254677] ufs: Invalid option: "m'm[6/Sd7 &>#G^Sq~GDGp]Ār|.VڄMWY;Qb9kNip2ѦCPV~m Z;" or missing value [ 366.262417] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 366.290314] ufs: wrong mount options 06:11:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:12 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x37d, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="e8fd5f30e0de6888b82d680283e31033800f7501a716854d166bc749326b8f67895fb1be423b675c8dff08e6bb5cdd5734a0f85dadf8616eb0d37f3b983955f9638c6b76351cf0f38e425ca3c748ec00c246269eb1377ad12e7d4e129682fdced767eb7379253b6cf6088742f30cf865f8001e933aaafbea8acca6adee0f39f6b08043ae5862369bf2be487697769e1adbca6ef076d68b383e01038155e2fb4b2c32ba958d5bb6e90de2055411860a058d83", 0xb2, 0xae}], 0x10, &(0x7f0000000180)={[{@map_normal='map=normal'}, {@map_off='map=off'}, {@check_relaxed='check=relaxed'}, {@session={'session', 0x3d, 0x32}}, {@cruft='cruft'}, {@utf8='utf8'}, {@block={'block', 0x3d, 0xc00}}, {@unhide='unhide'}, {@check_strict='check=strict'}], [{@permit_directio='permit_directio'}, {@obj_type={'obj_type', 0x3d, '*'}}, {@dont_appraise='dont_appraise'}, {@smackfstransmute={'smackfstransmute', 0x3d, '/'}}, {@permit_directio='permit_directio'}, {@appraise_type='appraise_type=imasig'}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '#^'}}]}) 06:11:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:12 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 366.544841] ufs: You didn't specify the type of your ufs filesystem [ 366.544841] [ 366.544841] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 366.544841] [ 366.544841] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 366.552351] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 366.623530] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 366.634096] EXT4-fs (loop3): group descriptors corrupted! [ 366.658827] ufs: ufs_fill_super(): bad magic number 06:11:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 366.853319] ufs: You didn't specify the type of your ufs filesystem [ 366.853319] [ 366.853319] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 366.853319] [ 366.853319] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 367.033718] ufs: ufs_fill_super(): bad magic number [ 367.149607] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 06:11:13 executing program 2: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsu\x00', 0x40, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) 06:11:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 367.203373] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 367.238409] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) 06:11:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(0x0, 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 367.297214] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 367.308191] EXT4-fs (loop3): group descriptors corrupted! 06:11:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:14 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 367.392950] ufs: You didn't specify the type of your ufs filesystem [ 367.392950] [ 367.392950] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 367.392950] [ 367.392950] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 367.483514] ufs: ufs_fill_super(): bad magic number 06:11:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 367.663625] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 06:11:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 367.753207] ufs: You didn't specify the type of your ufs filesystem [ 367.753207] [ 367.753207] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 367.753207] [ 367.753207] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 367.783182] ufs: ufs_fill_super(): bad magic number [ 367.863809] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 367.875622] EXT4-fs (loop3): group descriptors corrupted! 06:11:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:14 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000000)={[], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@measure='measure'}, {@subj_user={'subj_user', 0x3d, ',-)%-\\'}}, {@seclabel='seclabel'}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x38, 0x66, 0x62, 0x61, 0x34, 0x33, 0x33], 0x2d, [0x63, 0x65, 0x31, 0x39], 0x2d, [0x5a, 0x36, 0x37, 0x39], 0x2d, [0x9d, 0x38, 0x33, 0x35], 0x2d, [0xa3e29655118678e, 0x36, 0x39, 0x37, 0x38, 0x39, 0x32, 0x37]}}}, {@uid_lt={'uid<'}}, {@appraise='appraise'}]}) 06:11:14 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000000)=""/24, 0x18) 06:11:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(0x0, 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 368.247211] ufs: Invalid option: "mask=MAY_EXEC" or missing value [ 368.269122] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 368.281976] ufs: wrong mount options 06:11:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, 0x0, 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(0x0, 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 368.454919] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 368.484965] ufs: Invalid option: "mask=MAY_EXEC" or missing value [ 368.498221] ufs: wrong mount options 06:11:15 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000000)=""/24, 0x18) [ 368.509130] EXT4-fs (loop3): group descriptors corrupted! 06:11:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, 0x0, 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 368.598266] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 06:11:15 executing program 2: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vim2m\x00', 0x2, 0x0) setreuid(0x0, r1) ioctl$vim2m_VIDIOC_TRY_FMT(r2, 0xc0d05640, &(0x7f0000000080)={0x1, @pix_mp={0x2, 0x81, 0x584e4f53, 0xe4d47619684d2cd3, 0x5, [{0xffffffff, 0x1}, {0x7, 0x8}, {0x75d, 0x7}, {0x0, 0x9}, {0x8, 0x4}, {0x9, 0x5}, {0x2, 0x1df}, {0x7, 0x4}], 0x8, 0x4, 0x2, 0x2, 0x1}}) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000040)={[], [{@subj_role={'subj_role', 0x3d, 'ufs\x00'}}, {@measure='measure'}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}) 06:11:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 368.805714] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 06:11:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, 0x0, 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:15 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000000)=ANY=[@ANYBLOB="0066767e2ee49907269a8e2fd65711a9b0c93dad32544956dba927998fdce3756d2ff2e1cbf8000000000000a44254"]) 06:11:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:15 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000000)=""/24, 0x18) [ 368.982514] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 06:11:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 369.041355] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 369.071356] EXT4-fs (loop3): group descriptors corrupted! [ 369.131483] ufs: You didn't specify the type of your ufs filesystem [ 369.131483] [ 369.131483] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 369.131483] [ 369.131483] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 369.312604] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 369.354132] ufs: ufs_fill_super(): bad magic number 06:11:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 369.522056] ufs: You didn't specify the type of your ufs filesystem [ 369.522056] [ 369.522056] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 369.522056] [ 369.522056] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 369.550054] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 369.562084] ufs: ufs_fill_super(): bad magic number 06:11:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:16 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, 0x0, 0x0) [ 369.657174] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:11:16 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x40002000000000, 0x0, &(0x7f0000000840), 0x80001b, &(0x7f0000000040)=ANY=[]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3}}, 0x10) 06:11:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 369.951770] ufs: You didn't specify the type of your ufs filesystem [ 369.951770] [ 369.951770] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 369.951770] [ 369.951770] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:16 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, 0x0, 0x0) [ 370.164284] ufs: ufs_fill_super(): bad magic number 06:11:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB='d'], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 370.266879] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 370.297153] ufs: You didn't specify the type of your ufs filesystem [ 370.297153] [ 370.297153] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 370.297153] [ 370.297153] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 370.389195] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 06:11:17 executing program 5: semget(0x0, 0x2, 0x4e0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, 0x0, 0x0) 06:11:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB='d'], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 370.458210] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 370.474925] ufs: ufs_fill_super(): bad magic number 06:11:17 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x1, 0x0, 0x7, 0xae, 0x7, 0x53d}) 06:11:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB='d'], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:11:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 370.704825] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 06:11:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 06:11:17 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)=ANY=[@ANYBLOB='\x00']) [ 371.193443] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:11:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 371.267868] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 371.282438] ufs: You didn't specify the type of your ufs filesystem [ 371.282438] [ 371.282438] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 371.282438] [ 371.282438] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 371.334207] EXT4-fs (loop4): invalid first ino: 0 [ 371.344196] ufs: ufs_fill_super(): bad magic number 06:11:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r2, 0x0) perf_event_open(&(0x7f0000000240)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="64d1"], 0x3) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 06:11:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:18 executing program 5: getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/191, 0xbf}], 0xc7, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/212, 0x7ffff000}], 0x2, 0x0) getpgrp(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='clear_refs\x00') writev(r1, &(0x7f0000000140)=[{&(0x7f0000000080)='4', 0x1}], 0x1) gettid() 06:11:18 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x407412ec, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0}) 06:11:18 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000500)="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", 0x1000, 0x9}], 0x801013, &(0x7f0000000000)=ANY=[@ANYBLOB="88"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) [ 371.789715] EXT4-fs (loop4): invalid first ino: 0 [ 371.879843] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:11:18 executing program 1: 06:11:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:18 executing program 1: 06:11:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:18 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x801c32, &(0x7f0000000040)={[{'ufs\x00'}, {'\xdd]&'}, {')8!-\xf2\xd7 \xfe\x94|\x1f\xe3:\xbaLm\xbe=s\xd0\b\xb0\x8d\xa0\r(\xebT\xcf$\'3\xa1F\xf9\xf0\x83MRA\x06R-\xf2\f\xea\x0f/g.\xb5l\xf2\xa5\x9d\x97\x8b\xd6\x04\x944\':X\x86\xd5\xc3\xba0x0}, 0x2020) r1 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x12-\x00', 0xfffffffffffffffa) keyctl$get_persistent(0x16, r0, r1) 06:11:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}, {{&(0x7f0000003300)=@tipc=@id, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}, {0x0}, {&(0x7f0000004580)=""/203, 0xcb}, {0x0}, {&(0x7f00000048c0)=""/218, 0xda}], 0x6, &(0x7f0000004a40)=""/243, 0xf3}}], 0x20004582, 0x2, 0x0) 06:11:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000035000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 373.890089] ufs: You didn't specify the type of your ufs filesystem [ 373.890089] [ 373.890089] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 373.890089] [ 373.890089] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 373.933352] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 374.024030] kvm [22858]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop 06:11:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 374.090305] kvm [22858]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop [ 374.103774] ufs: ufs_fill_super(): bad magic number [ 374.120757] kvm [22858]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop [ 374.134910] kvm [22858]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop 06:11:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 374.161130] kvm [22858]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop [ 374.198478] kvm [22858]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop [ 374.208643] kvm [22858]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop [ 374.211488] ufs: You didn't specify the type of your ufs filesystem [ 374.211488] [ 374.211488] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 374.211488] [ 374.211488] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 374.222031] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 374.255703] kvm [22858]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop [ 374.265541] kvm [22858]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop [ 374.275784] kvm [22858]: vcpu0, guest rIP: 0xcc kvm_set_msr_common: MSR_IA32_DEBUGCTLMSR 0x1, nop 06:11:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 374.471604] ufs: ufs_fill_super(): bad magic number 06:11:21 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000040)) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000080)=ANY=[@ANYBLOB="804bde5f7cd785e12c28e32bc181ab1c90a03bcf366688e5da640d492279718a3b4a36a4c9afc9bf690da762047228d8a6cabc04d1dbae71ccac475eea2893a2e84bc02fdfb946d3d931220ddfb91b23f9d99732f3194fbfd637739437fcc2161e19d9634bd6dabb656a93b661d9bf6bcedc6b62b32bda682074497ca0539201a372cbe763ee5fed13014735bbe6852311f6cf47557a799e4b95685e16018a7b5a47e796a6"]) [ 374.639135] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 06:11:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 374.839226] ufs: Invalid option: "K_|ׅ" or missing value 06:11:21 executing program 5: perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x171}, 0x48) [ 374.901119] ufs: wrong mount options [ 375.035396] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 375.045948] ufs: Invalid option: "K_|ׅ" or missing value [ 375.054555] ufs: wrong mount options 06:11:21 executing program 2: r0 = syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)=ANY=[@ANYBLOB="01"]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000140)) r3 = signalfd(r0, &(0x7f0000000000)={[0x5]}, 0x8) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x2f, 0x2, 0xff, 0x9, 0x0, @private0={0xfc, 0x0, [], 0x1}, @rand_addr=' \x01\x00', 0x8000, 0x8, 0xf2, 0x2}}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000100)={r4, 0x1, 0x6, @random="b1fbb700d2b3"}, 0x10) 06:11:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300), 0x0, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:21 executing program 5: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwrite64(r0, &(0x7f00000002c0)="84bbfeb333", 0x5, 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r2 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x7, 0x40c080) sendmsg$AUDIT_ADD_RULE(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000a00)=ANY=[@ANYBLOB], 0x428}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0xfffffffffffffcd2}, 0xff7f) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fdatasync(r3) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(r3) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x100a00, r3, 0x9}) [ 375.250405] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 375.372919] ufs: Invalid option: "" or missing value [ 375.396398] ufs: wrong mount options [ 375.493370] ufs: Invalid option: "" or missing value [ 375.519802] ufs: wrong mount options [ 375.768249] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:11:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000004b40)=[{{&(0x7f0000000b00)=@rc, 0x80, 0x0, 0x0, &(0x7f0000001e40)=""/239, 0xef}}, {{&(0x7f0000003300)=@tipc=@id, 0x80, &(0x7f00000049c0)=[{&(0x7f0000003380)=""/83, 0x53}, {0x0}, {0x0}, {&(0x7f0000004580)=""/203, 0xcb}, {0x0}, {&(0x7f00000048c0)=""/218, 0xda}], 0x6, &(0x7f0000004a40)=""/243, 0xf3}}], 0x20004582, 0x2, 0x0) 06:11:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:24 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)=ANY=[@ANYBLOB='\x00']) 06:11:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x14, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) [ 378.521855] ufs: You didn't specify the type of your ufs filesystem [ 378.521855] [ 378.521855] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 378.521855] [ 378.521855] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 378.597338] ufs: ufs_fill_super(): bad magic number 06:11:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x3474}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 06:11:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f0000000540)=""/4096, &(0x7f00000000c0)=0x1000) [ 378.842668] ufs: You didn't specify the type of your ufs filesystem [ 378.842668] [ 378.842668] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 378.842668] [ 378.842668] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 378.911798] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 06:11:25 executing program 1: socket$inet(0x2, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f8", 0x16}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020", 0x4b, 0x600}], 0x0, &(0x7f00000003c0)={[{@fat=@check_strict='check=strict'}]}) futimesat(r0, &(0x7f0000000080)='./file0\x00', 0x0) [ 378.959662] ufs: ufs_fill_super(): bad magic number 06:11:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:25 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0xffffffffffffffff, 0x6, &(0x7f0000000380)=[{&(0x7f0000000500)="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", 0x1000, 0x2}, {&(0x7f0000000040)="62b1a1e7dab04e9da993ac1f2418ec93b367048caabdd9206e67825dc8512269ea83ce795b5933f1394febaca2fcab824e741842c58b468af2abaa307d0a53f7e1bf93470517", 0x46, 0x9}, {&(0x7f00000000c0)="002da95d65565c9b326eb6a74ba53e3f69f3f3875fb25549952b7b29596a02042ca9150122cdf437ff64d972503c2514764c4fee91b3441040cdbdec0bbccc5810f7846d674d76d1a3784d278c7e3637720059c9909e8a5026840c34ad3bccfaa807bf3a27e421eaa7b76c9b3b4090db1b9fee775097013ae3938e8c0f1362475426bec9b98bffb00c41a32478fdc4734dbc194b0d7b6b951dbb7698e75391052fa411bb4a3e88f2b4fffc310276cb0ff33d46f39bcb03664505275f0106e32f6a07e7bb8d370943ccfca26633af75b218dfef8c", 0xd4, 0x30000}, {&(0x7f00000001c0)="c7ec7e2e72ffb42f02b0129cbb79cdb309c59407e6fc2f53f1b6a66ec5a2d0f04bdd087ffcad72eadd04160da035901d6a30c78676cea22e270da6cd1922097d11d8a1cad22d8cc3245a44e994c2939d15a78d79c34248f6bd81300bc8ae1aa73052261bfa488faa90b5cbb1dc3caf7a97e0b93efc38fd40b87c6d18fb1306fa694e4c0f79a3b5c8f9f98da9b0891cdd02f7ca63c80f20e2a878d6ba86b49ebf5d5d7da041c013fc72b3e54e4deebf27aafe733a1de7d7d39e5b8f7ff540425c88b89b2458d67a20ed60a64dcba5a1f8fdc85ef72cf5d90ae17eaa56c1c2e1156f9383a3c2c8af0c32cb18c4abc2ba9adc6f3a16e9bbf159121d63", 0xfb, 0x5}, {&(0x7f00000002c0)="9a22ee2fafd001eff8980b77991bc23ed3d2501f693dacd1f198441f7055fedae4a55b0f7961815840d483c08b9b9bf397afc65e5e13d1b7b464aa49c83d3d8f49b31a2935a7bbd1cb80ed88898bdbd92ac434bcb15a3d7fb378dbcd127e49b7a339fb12b76139830c7795bb59c5d8", 0x6f, 0x1}, {&(0x7f0000000340)="f295cc15167de772966be1e6e7599d549c54aedbcfa25fac38a8b83f020002681d43", 0x22, 0x10000}], 0x800013, &(0x7f0000001740)=ANY=[@ANYBLOB="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"/536]) 06:11:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x38, 0x2, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) [ 379.112383] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 379.191571] FAT-fs (loop1): bogus number of FAT sectors [ 379.204183] FAT-fs (loop1): Can't find a valid FAT filesystem 06:11:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:25 executing program 5: bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000005c0)={0xffffffffffffffff, &(0x7f00000004c0)="74d814386724349c18ea92ff2e5ecfeba0930f3dbeb706e4c4fbd3bdca06be5863172d4794d8a44bad9f3d69b9e46e34b923bdbb6716f176e206fb77665298aada1e3ed4bdcad94c78afc6544113f2344960931cac312a210d8617f0276f607a26f1f8871993682e83cee8e59fa057fd4a1b1b32c339ebd7ac6e136387263ac623da19331292f2be64bc430ebac666b455226316f861fb9e55ae7936cc19aa29856deeb35971fdb4d1a89064f3bd32b2a467ede1c9f9feb326f6fe882998e17f44cdb1994490a0a6"}, 0x1c) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="540000eb0806010200000000000000000a000003090002007379863200000000280008800c00078005001500030000000c00078008000b40000000000c00078008000b40000000550900020073797a3200000000"], 0x54}, 0x1, 0x0, 0x0, 0x44000}, 0x4008000) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000240)=ANY=[]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setresgid(0x0, 0x0, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) setresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) ioprio_get$uid(0x3, r1) stat(&(0x7f0000000000)='./file0\x00', 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000100)={0xa0, 0x0, 0x0, {{0x3, 0x1, 0x7ff, 0x3, 0x401, 0x3ff, {0x2, 0x1, 0x0, 0x0, 0x69d, 0xd17, 0x8, 0x0, 0x7f, 0x6000, 0x101, r1}}, {0x0, 0x1c}}}, 0xa0) setgroups(0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x491282, 0x0) pwritev(r2, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47ffffe}], 0x1, 0x400fa7f, 0x0) 06:11:25 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$netlink(r0, 0x10e, 0xc, &(0x7f0000000540)=""/4096, &(0x7f00000000c0)=0x1000) [ 379.401310] ufs: Invalid option: "^:]-rA :|kO$Jp+~"g>+YRqfg" or missing value [ 379.484569] ufs: wrong mount options [ 379.492588] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 06:11:26 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x1b9e43, 0x0) vmsplice(r0, 0x0, 0xfffffffffffffe89, 0x0) [ 379.743053] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 379.761604] ufs: Invalid option: "^:]-rA :|kO$Jp+~"g>+YRqfg" or missing value 06:11:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:26 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x2) sendfile(r2, r0, 0x0, 0x6f0a77bd) [ 379.816154] syz-executor.5 (23054) used greatest stack depth: 23088 bytes left [ 379.824226] ufs: wrong mount options 06:11:26 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001580)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7499cde2bbaf4b06d3585a09a87717ebf4e43bc06"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x4e000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 06:11:26 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)=ANY=[@ANYBLOB=')']) syz_mount_image$ocfs2(&(0x7f0000000000)='ocfs2\x00', &(0x7f0000000040)='./file0\x00', 0x10000, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="84d7f10f3db177596e9ccd673895cf0568120d3ed7ac8e6154277276018a7b42184dd3baa4b19931db29c644cb02e1694abf29ff82db8578c3c419b8facf0434c1de235934857a7591a4a54fcf947cb2045aaad8e2b2f1180efdc3106326d5ec380aed7dd6b0491e8ec4496f6944f3f1d09f9fb15756377f12f7d92676a31cb5ad218c725e338a98c88815b4b2ec493074c9082f5fd3d9dd54534b629033d1f452c2e6ccb172a97ba06f5adca65f163bd9654e98e6a7e7175913e3ad2771ffc9d41ab56df2e928d1a8ee9547b4ed0572ab", 0xd1, 0x6}], 0x1001c, &(0x7f00000001c0)={[{']}{-{'}, {'#]^'}, {'ufs\x00'}, {'ufs\x00'}, {'ufs\x00'}], [{@audit='audit'}, {@dont_hash='dont_hash'}]}) 06:11:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 380.144562] ufs: Invalid option: ")" or missing value [ 380.224074] ufs: wrong mount options 06:11:26 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 380.304477] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 380.322636] ufs: Invalid option: ")" or missing value [ 380.332291] ufs: wrong mount options 06:11:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="030000", 0x3, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8983, &(0x7f0000000540)={0x6, 'veth1_vlan\x00'}) 06:11:27 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x800013, &(0x7f0000000900)=ANY=[]) 06:11:27 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, 0x0, 0x0, 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r0, r1, 0x25, 0x2}, 0x10) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000280)={0x0, 0x0}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000100)=r2, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000001c0)={r3, 0xffffffffffffffff, 0x4, r0}, 0x10) [ 380.622313] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 06:11:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80284504, &(0x7f0000000080)={0x3, 0x0, 0x0, 0x0, "07000000ff015694c8766f471608e0e8c8b0f100"}) [ 380.877166] ufs: You didn't specify the type of your ufs filesystem [ 380.877166] [ 380.877166] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 380.877166] [ 380.877166] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:27 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000001340)=ANY=[@ANYBLOB="18020000e2ffffff000000000000000085000000360000009500001800000000922ae83713ab9600010000801b10fb54a8cb72d232ad558c46fff4208d49631979a42d6884ec11ce1413ac30e00bd0081f8504e19a5183d769676520e98a263345e44d5187b3c4d86abeb12303ff139fe0d0020000d604000000670000008aff66d6b3181ffc1d62a3954c11c27839dc007c4d296e7359ea79a75dd098bbc4fa13aee48ca9e8969faebf3183fe803ab3f5024b52dc265b36fc9dae00a0d0956d252bd8b6464ef3c6a7def8bad3ca6e3abdb2dfc61696e340bb8e2a093adc57196b40def3858ef569147fa4108328392d322ab4df10a2f69a6bdf7257d327070e42410f57466f59aea2544047d6d8ac442e0000000000ee16c729300d230180000000000000a8a0b36754ed5290a8cd8470e776d6b80630d6cbde49b29a6cb5f4fc0001745c380e5fe57238aeada5acf3209a08439f1ff01ffbe5b57922b6f6c67e02aa6d7760525b595fe1f697bc114cd1778e97a3f0295f946974cdb458be2a34cf924dc36b558fbf17a76f3547497aba5086e30ec8a57c814382ffab045ca077a9d15251875432e74b54afaf4985672a1c7b3c200021de95ae7b68136b0046d535dd39c0f35469869e9b342b953f81447e6b9e522d62b1e6ffcaab304f134306335fc7a44195254b45a6c1312a13696c7202df5f764713504f94c5e0fbc70bcb975f97ed7b0300000000000000e54e9072a22d91744a332e2fa806e63c5cd98a8569a6d6bcfb0000002cf6c75ac63f04af77c98a1459ab1664885173b2b7130eae67e0ebe380d0f648713e68153579c02d71c58d147b00821ab9a6475b31e1ebf1369afe98682efbf3983f283f2faf8f40e39927aca9ec527fb5b6bf7e7b0374814d63c93c912dd0c6908149cb79c54b0a38856929e7d8b1b06c9bd5d7e5490f3b8596b694ea9483bd4bd287c83df998a7469426ec8b0000000000000010ff2cd18bdd8ad0983bc90770bbd26a82b9d99d17c02a97b52304ff782ca00edf8e47a71bcc738ef636d32b01933556f9afe772cd45af0a400bd3c06cb78aeffe2753088e02ca6bb2feecf0a93a03371320980865c7c62ea4d8f8a864dce9fa85aeb0454349100296ee2dba39c3f6fd6cf96714e168e03b506380591a8c68e537dd659a7418c1e122bd4c219ff5a679eec47b0e99f017246dc0c18a30160f2ac54f842e3be1c95b15175d0e664beb126000e96549e1a1208c686edb475b705e8a9515c96f4fc6b3c925ea40e61026dc6c6618580fd6ce9eac602c1756f6d105671241d48a8abe64f5caecc4ef953383722135ed9925989e01eae489ec7052f82a72cb26c7a8aa63999ee1f47ce5cb734d773ea52b6dbbd56d222659480e82c6f84d2033d9d1b597c54ce1822d14b7c7699b9d701e94e7b421dd474cffbc35bc8623cd5eb68af82275a940be6f5288eacb42822cbcc3fbe7d90de96d6a8e9f54cf881f606b381e4803b500000000000000000000004a2357ba5f6000de1cfa88b7165dcfcf2aaee86d48f05b5024b653ea923c19e6cb723c1923b3eea2d73e136dff383c9fbbac53dfdcb1a68c98d8e96fe39eec23963faf3ebed31aec56987fde93e9ced678a621450a9b01f9f2772e5fa454d68d90677d8de36c3215d2ff3cfadcf65eb92adc6c62d66b11cb2d7556414a86dfa94bb7aa52c7febb1e9b2efcbbc5bccf9d39bed802f4f056976a128c764ec454b90200fd9603f96908bddc1450b4084abc4c7b82e05595a68c34e79253e3bb34bc7d049bea9bf149fef4df5c45f8b94c5aafad755c43e63664e4b26a000000000000000000ca6e105943f8229a146f16c0b7824f41b210b88f5f52189b0cc117ba5a4d9ebcfec0d341fc43bffd2315aa98ccb0e1aaec08a428cb86b36e2ba33bf910d3e983607c2bf99470b10ccef5428e84c916fab1b033246cc4827db8957ccea2f1ef80e46ce86f313f17bdbf1298e1922a4e7b"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r0, r1, 0x25, 0x2}, 0x10) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000280), 0x8) 06:11:27 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 381.095757] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 381.117999] ufs: ufs_fill_super(): bad magic number 06:11:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 381.279281] ufs: You didn't specify the type of your ufs filesystem [ 381.279281] [ 381.279281] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 381.279281] [ 381.279281] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x20400046, &(0x7f0000000080)=""/164) 06:11:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x0, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:27 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 381.326370] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 381.349602] ufs: ufs_fill_super(): bad magic number 06:11:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:28 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000900)) 06:11:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x20400046, &(0x7f0000000080)=""/164) 06:11:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x20400046, &(0x7f0000000080)=""/164) [ 381.670830] ufs: ufs was compiled with read-only support, can't be mounted as read-write 06:11:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x0, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:28 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 381.832864] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 06:11:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x20400046, &(0x7f0000000080)=""/164) [ 381.934984] ufs: ufs was compiled with read-only support, can't be mounted as read-write 06:11:28 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)=ANY=[@ANYBLOB='X']) 06:11:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:28 executing program 1: mincore(&(0x7f0000000000/0x400000)=nil, 0x20400046, &(0x7f0000000080)=""/164) [ 382.084918] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:11:28 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:28 executing program 1: mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) 06:11:28 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x0, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 382.290683] ufs: Invalid option: "X" or missing value [ 382.296036] ufs: wrong mount options [ 382.467493] ufs: Invalid option: "X" or missing value [ 382.493749] ufs: wrong mount options 06:11:29 executing program 1: mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) 06:11:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03000000", 0x4, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_DOI={0x8, 0x1, 0x1}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004050}, 0x10) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000000)) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) [ 382.613890] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:11:29 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:29 executing program 1: mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0) [ 382.776496] ufs: You didn't specify the type of your ufs filesystem [ 382.776496] [ 382.776496] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 382.776496] [ 382.776496] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 382.809973] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 06:11:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001580)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000002c3f2cc2b7954244cef7499cde2bbaf4b06d3585a09a87717ebf4e43bc06"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0x69, 0x4e000000, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) [ 382.838003] ufs: ufs_fill_super(): bad magic number [ 383.069868] 9pnet: Insufficient options for proto=fd 06:11:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:29 executing program 2: ioctl$DRM_IOCTL_MODE_DIRTYFB(0xffffffffffffffff, 0xc01864b1, &(0x7f0000000040)={0x1, 0x0, 0x3, 0x4, &(0x7f0000000000)=[{0x2335, 0x1, 0x7ec0, 0x101}, {0x9, 0x5, 0x400, 0x7}, {0x5, 0xd8, 0x5, 0x1f}, {0x7fff, 0x8, 0x5, 0x8001}]}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400000, 0x0) bind$bt_sco(r0, &(0x7f00000000c0)={0x1f, @none}, 0x8) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) 06:11:29 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6800) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x48280) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400ffffbffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) 06:11:29 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 383.409148] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:11:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 383.462693] ufs: You didn't specify the type of your ufs filesystem [ 383.462693] [ 383.462693] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 383.462693] [ 383.462693] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 383.533473] audit: type=1804 audit(1600927890.052:14): pid=23304 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir035623463/syzkaller.brw4VI/914/bus" dev="sda1" ino=16839 res=1 [ 383.658564] ufs: ufs_fill_super(): bad magic number [ 383.724781] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 06:11:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000035000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x51}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5e]}) sendmsg$BATADV_CMD_TP_METER_CANCEL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 383.777865] audit: type=1804 audit(1600927890.182:15): pid=23311 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir035623463/syzkaller.brw4VI/914/bus" dev="sda1" ino=16839 res=1 06:11:30 executing program 2: r0 = socket$phonet(0x23, 0x2, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1, 0x25, 0x4, 0x2}, {0x6, 0x20, 0x3}, {0x5, 0x81, 0x0, 0x7fff}]}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000940)={{0x9, 0x3, 0x5, 0x20, 'syz1\x00', 0xd0}, 0x0, [0x1, 0x30, 0xffff, 0x5, 0x5, 0x401, 0x9, 0x101, 0x4, 0x1, 0x658605a4, 0x4, 0x3, 0xffff, 0xdeb3777, 0x8, 0xdebf, 0x5, 0x6ba, 0x3c5f812e, 0x6, 0x956, 0x2, 0x100000001, 0x5, 0xfffffffffffff001, 0x4, 0x5, 0x2, 0x400, 0x4, 0xffffffffffffcfd4, 0xfffffffeffffffff, 0x20, 0x4, 0x3, 0x5, 0x1, 0x9, 0x400, 0x4, 0x6, 0x0, 0x7, 0x0, 0xbcd3, 0x6, 0x9, 0x24f5, 0x5, 0x6, 0x3, 0x53, 0x53, 0x390, 0x5, 0x4, 0x100, 0x1, 0x5b, 0x100000001, 0x80, 0x8, 0x0, 0xffffffffffff7fff, 0x8, 0x5, 0x9, 0x10000, 0xee, 0x6, 0x8, 0x1, 0x8, 0xfffffffffffffffb, 0xff, 0xa36, 0x1, 0x101, 0x6309, 0x1, 0x1, 0xa99b1e8, 0x8, 0x400, 0x0, 0x1, 0x12ba5639, 0x8, 0x3, 0x7, 0x4, 0x6c9, 0x6, 0x3ff, 0x31, 0x2, 0x9, 0x6, 0x6, 0x5b, 0x8, 0xa1, 0x800, 0x3, 0x8f1, 0x800, 0x20, 0x1, 0xb86, 0x8, 0x6, 0x9, 0x8, 0x1000, 0x7, 0x81, 0xfffffffffffffffa, 0xfffffffffffffffa, 0x101, 0x6, 0x4000000000, 0x0, 0x3, 0x61, 0x7, 0x1f, 0x5]}) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) 06:11:30 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 383.811789] audit: type=1804 audit(1600927890.182:16): pid=23304 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir035623463/syzkaller.brw4VI/914/bus" dev="sda1" ino=16839 res=1 06:11:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 384.041959] ufs: You didn't specify the type of your ufs filesystem [ 384.041959] [ 384.041959] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 384.041959] [ 384.041959] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 384.344057] ufs: ufs_fill_super(): bad magic number [ 384.344872] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:11:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 384.491586] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 06:11:31 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000000)=ANY=[@ANYBLOB="9a2af0d42d38961bd72d20875116cc82a9f57390c75f15b8e195ab5da075c1982c54bcf88e9780f4a972a4219ac760370b44a9701c1ac40a83fbcb5d0087"]) 06:11:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:31 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:31 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) [ 384.760440] ufs: Invalid option: "*-8- Q̂s_ᕫ]u" or missing value [ 384.897938] ufs: wrong mount options 06:11:31 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 385.001305] ufs: Invalid option: "*-8- Q̂s_ᕫ]u" or missing value [ 385.011363] audit: type=1326 audit(1600927891.542:17): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=23396 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7fc00000 [ 385.036807] ufs: wrong mount options 06:11:31 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f00000001c0)="46b15a7f2415022b16f18f669c36401fb7a33683c7caa37f133eb9f9a3d42d4dd719ed9643fadbb30586eb4c0f93c6b2013d7d977340f09ee7ec8dba274a50dec599b557a5c340163a267eb3ed1be522bccd3df914096c7b140f74f0e0b5c7768d", 0x61, 0x2a933219}, {&(0x7f0000000240)="f21c8a63d19469213a4114ed044e0604323decfefc70343c6a0f37eae7a584b909a8efa56c61547b63562d1dd88cb3a6993d1ff577660dab3b3f10b6c7ffb543c30a5b70e028f181059623e0a18e0fd58f92c0abe8ae6f9aa470f3888691276dd63def851758dd226e5fb174a3f3a394f1a930eca7686ff0678031c8ff2901876688963fcbba0b0694eea56009819be33b48519d3c2f9c", 0x97, 0x3}], 0x800013, &(0x7f0000000000)=ANY=[@ANYBLOB="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"]) ioctl$FBIOGET_FSCREENINFO(0xffffffffffffffff, 0x4602, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, &(0x7f0000000340)) 06:11:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 385.174956] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue [ 385.219643] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 06:11:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 385.383542] ufs: Invalid option: "*g&QxjzH'Q(M;1" or missing value 06:11:31 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 385.437038] ufs: wrong mount options 06:11:32 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) [ 385.724196] ufs: You didn't specify the type of your ufs filesystem [ 385.724196] [ 385.724196] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 385.724196] [ 385.724196] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 385.800425] audit: type=1326 audit(1600927892.322:18): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=23396 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x460fba code=0x7fc00000 06:11:32 executing program 1: [ 385.912059] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 06:11:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:32 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 385.996025] ufs: ufs_fill_super(): bad magic number 06:11:32 executing program 1: [ 386.047483] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue 06:11:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 386.127714] ufs: You didn't specify the type of your ufs filesystem [ 386.127714] [ 386.127714] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 386.127714] [ 386.127714] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 386.226032] ufs: ufs_fill_super(): bad magic number 06:11:32 executing program 1: 06:11:32 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000240)={0x98f907, 0x2, @value}) ioctl$VIDIOC_DBG_S_REGISTER(r0, 0x4038564f, &(0x7f0000000000)={{0x2, @name="ef5e0ffcd73f5eaf58905f621e38e558ff5bf63fda2a9805835f971add0bf98a"}, 0x8, 0x7, 0x81}) 06:11:32 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 386.407319] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 06:11:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, 0x0) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:33 executing program 1: 06:11:33 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000059227cdf82d23472772e8b489b3c85e6ff16bb53670f3c73b121a2ba771b47d482d9b645b9841382846da17c46798c1e81cf4b58dd92061495094a91990900716285d646cb06c821be9433ebae6461"]) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x88, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:v4l_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x88}, 0x1, 0x0, 0x0, 0x4800}, 0x20000000) [ 386.589340] EXT4-fs (loop3): unsupported descriptor size 0 06:11:33 executing program 1: 06:11:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:33 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, 0x0) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:33 executing program 1: [ 386.814271] ufs: You didn't specify the type of your ufs filesystem [ 386.814271] [ 386.814271] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 386.814271] [ 386.814271] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 386.907007] ufs: ufs_fill_super(): bad magic number 06:11:33 executing program 1: sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x7f, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 386.953910] EXT4-fs (loop3): unsupported descriptor size 0 06:11:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) 06:11:33 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setreuid(r2, 0x0) sendfile(r1, r0, 0x0, 0x8) [ 387.093308] ufs: You didn't specify the type of your ufs filesystem [ 387.093308] [ 387.093308] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 387.093308] [ 387.093308] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x318, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x84) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d413ffaefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:11:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:33 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 387.234057] ufs: ufs_fill_super(): bad magic number [ 387.273366] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:11:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000780)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002001100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f00000000c0)='A', 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x4) fcntl$setstatus(r0, 0x4, 0x80000000002c00) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) 06:11:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, 0x0) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:33 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:34 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 387.622585] ufs: You didn't specify the type of your ufs filesystem [ 387.622585] [ 387.622585] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 387.622585] [ 387.622585] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 387.681772] EXT4-fs (loop3): unsupported descriptor size 0 06:11:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:34 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r0 = dup(0xffffffffffffffff) write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 387.964629] ufs: ufs_fill_super(): bad magic number 06:11:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x318, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x84) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d413ffaefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:11:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 388.133335] 9pnet: Insufficient options for proto=fd 06:11:34 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r0 = dup(0xffffffffffffffff) write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 388.540834] EXT4-fs (loop3): unsupported descriptor size 0 06:11:35 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r0 = dup(0xffffffffffffffff) write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:35 executing program 2: ioctl$SNDCTL_DSP_SETDUPLEX(0xffffffffffffffff, 0x5016, 0x0) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000000)=ANY=[@ANYBLOB="ee"]) 06:11:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 388.714770] 9pnet: Insufficient options for proto=fd 06:11:35 executing program 5: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 389.007692] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 389.020908] ufs: Invalid option: "" or missing value [ 389.066658] ufs: wrong mount options 06:11:35 executing program 5: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x318, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x84) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d413ffaefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:11:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000040)) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'syzkaller1\x00'}) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1a, &(0x7f000004c000)=0x23, 0x4) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x2b) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r4, 0x29, 0x1a, &(0x7f000004c000)=0x23, 0x4) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x2b) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x800013, &(0x7f00000000c0)=ANY=[@ANYRES16=r1, @ANYRESOCT, @ANYRES32=r2, @ANYRES64=r3, @ANYBLOB="81c186ba6d0bcfd350b894f2b72c9c18c6727f13f46de45020e385fa55748fc0c2c9f6a1fd73fb072138ad5d646c92f26e6e395f6ea702b7e48de2c53265c51cb00a16af16a927e28dc1f735356be88a87acf629e99517d390e9f0dc7fbce6b8d410b26b3107ce6dac1dd4f1eb1c7fe76b5b708f43414e1bf8ef5e7899ece2b40150507e2a4f25fcbbc59c1b1f381048c167461e01f08dc7692a6636a6a9a271e1c2126ab20ec1db", @ANYRES16=r4, @ANYRES64=r3, @ANYRES64, @ANYRES32=r4]) 06:11:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 389.324250] EXT4-fs (loop3): unsupported descriptor size 0 06:11:35 executing program 5: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 389.462761] ufs: Invalid option: "" or missing value [ 389.484306] ufs: wrong mount options 06:11:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:36 executing program 5: mkdir(0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 389.635624] ufs: Invalid option: "" or missing value [ 389.652064] ufs: wrong mount options 06:11:36 executing program 2: r0 = syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = dup(r0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f00000000c0)) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000000)=r1) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) 06:11:36 executing program 5: mkdir(0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 390.045603] ufs: You didn't specify the type of your ufs filesystem [ 390.045603] [ 390.045603] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 390.045603] [ 390.045603] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:36 executing program 5: mkdir(0x0, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x318, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x84) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d413ffaefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 390.124651] ufs: ufs_fill_super(): bad magic number [ 390.128562] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:11:36 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r0 = dup(0xffffffffffffffff) write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 390.285595] EXT4-fs (loop3): unsupported descriptor size 0 [ 390.296826] ufs: You didn't specify the type of your ufs filesystem [ 390.296826] [ 390.296826] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 390.296826] [ 390.296826] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 390.327452] ufs: ufs_fill_super(): bad magic number 06:11:36 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r0 = dup(0xffffffffffffffff) write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 390.370834] 9pnet: Insufficient options for proto=fd 06:11:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000000)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) 06:11:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 390.731199] ufs: You didn't specify the type of your ufs filesystem [ 390.731199] [ 390.731199] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 390.731199] [ 390.731199] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 390.778286] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 390.779480] 9pnet: Insufficient options for proto=fd [ 390.813891] ufs: ufs_fill_super(): bad magic number 06:11:37 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(0x0, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r0 = dup(0xffffffffffffffff) write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 390.834666] EXT4-fs (loop3): unsupported descriptor size 0 [ 391.055953] 9pnet: Insufficient options for proto=fd [ 391.101240] ufs: You didn't specify the type of your ufs filesystem [ 391.101240] [ 391.101240] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 391.101240] [ 391.101240] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x318, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x84) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendto$inet(r0, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d413ffaefd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0xffffffffffffffd0, 0x401c005, 0x0, 0xffffffffffffff36) 06:11:37 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 391.240941] ufs: ufs_fill_super(): bad magic number 06:11:37 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)=ANY=[@ANYBLOB='$']) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') [ 391.358936] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:11:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 391.634374] EXT4-fs (loop3): unsupported descriptor size 0 06:11:38 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 391.739142] ufs: Invalid option: "$" or missing value [ 391.779560] ufs: wrong mount options 06:11:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:38 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 391.866511] ufs: Invalid option: "$" or missing value [ 391.871831] ufs: wrong mount options 06:11:38 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x14, r0, 0xab9535e9a6578fc1, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0xb4, r0, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xa}, @NL80211_ATTR_STA_WME={0x4c, 0x81, [@NL80211_STA_WME_UAPSD_QUEUES={0x5}, @NL80211_STA_WME_MAX_SP={0x5}, @NL80211_STA_WME_MAX_SP={0x5}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x2}, @NL80211_STA_WME_MAX_SP={0x5}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x1d}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0x6}, @NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x9}, @NL80211_STA_WME_UAPSD_QUEUES={0x5, 0x1, 0xff}]}, @NL80211_ATTR_STA_LISTEN_INTERVAL={0x6, 0x12, 0x40}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5, 0xe4, 0x1}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x625}, @NL80211_ATTR_STA_PLINK_STATE={0x5, 0x74, 0x6}, @NL80211_ATTR_STA_CAPABILITY={0x6, 0xab, 0x247}, @NL80211_ATTR_STA_SUPPORTED_CHANNELS={0x12, 0xbd, [0x8001, 0xffff, 0x8000, 0x4, 0x3, 0x1, 0x4]}, @NL80211_ATTR_STA_SUPPORTED_RATES={0x8, 0x13, "40fb0623"}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5, 0x113, 0x1}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4004894}, 0x8000) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000240)=""/117, &(0x7f00000002c0)=0x75) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000000)=ANY=[@ANYBLOB="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"]) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-generic\x00'}, 0x58) r2 = semget$private(0x0, 0x8, 0x0) semctl$GETZCNT(r2, 0x0, 0x10, 0x0) semctl$IPC_INFO(r2, 0x4, 0x3, &(0x7f0000000780)=""/157) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) accept$alg(r1, 0x0, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)={0x144, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0xfffff3de}, @NL80211_ATTR_SCAN_SUPP_RATES={0x11c, 0x7d, 0x0, 0x1, [@NL80211_BAND_60GHZ={0xd2, 0x2, "622fb6223397e66733f9fcafc5cdf39d9974ab4284aeb1ed86709bcb2fb01ed5cddabd2e0dd80a95fe6482e9a456c56b07914323b893c4e9f4e21d4ed54ba8c0edb5aede552f1e8c3e4e743786599ec1a6451fac4f99e9d706d9a7673860aaa53f5bc041734e2547f9e2d1f8b6ab30c14ef2f503d66f5626746ccb3ba4021d47c76556048e289febdc208bfdfb1a0116e69247367fd3f725aac37438a4d0619352d796eeb3b752e0135ca13711a4201dd96772240ab302964277917393ce40ace7b2e2a62055c2d79d3431f0c875"}, @NL80211_BAND_5GHZ={0x42, 0x1, "dc6e6b2264b6bf7c869db955917ee89dab1cfa215613ab54777fca5e2dc6b194b7f2f90d15e82b414248864371b00621d122d85636fdb33a961cef902687"}]}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x81}, @NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}]}, 0x144}, 0x1, 0x0, 0x0, 0x3}, 0x488d0) 06:11:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r1 = accept4(r0, 0x0, &(0x7f00000000c0), 0x80000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x318, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x84) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) 06:11:38 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, 0x0, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 392.340664] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:11:38 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, 0x0, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, 0x0, 0x0, 0x0) keyctl$read(0xb, r0, &(0x7f0000000000)=""/24, 0x18) [ 392.411120] ufs: Invalid option: "$< 2f6QfVos8ʬLk{uHRU*>N" or missing value [ 392.440405] EXT4-fs (loop3): unsupported descriptor size 0 [ 392.450652] ufs: wrong mount options 06:11:39 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, 0x0, 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 392.665851] ufs: Invalid option: "$< 2f6QfVos8ʬLk{uHRU*>N" or missing value [ 392.721059] ufs: wrong mount options 06:11:39 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000000)=ANY=[@ANYBLOB="68ccd56b8e7ef29da4b1d0dba666c6ddb8dd988ed918ed337101cf77bc200000e3d637ed5a5c55923e22187d030000002072006b01bda0e263889a52a73605110d8457d68acc39bed883b703ff8825aa1ad677c8754f3ccf826d1acbfeb649139666d4df6e8ce9622415cafcc95eaebe0c513a841c3e0214eb9d224f8a743b1e85259d307084cf4b078d65d215288ee0620fe00399277f18143e62"]) 06:11:39 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000000)=""/24, 0x18) [ 392.956481] ufs: Invalid option: "hk~򝤱ۦfݸݘ3qw " or missing value [ 392.964234] ufs: wrong mount options [ 393.063798] ufs: Invalid option: "hk~򝤱ۦfݸݘ3qw " or missing value [ 393.096778] ufs: wrong mount options 06:11:39 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) accept4(r0, 0x0, &(0x7f00000000c0), 0x80000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r1, 0x318, 0x70bd28, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40001}, 0x84) 06:11:39 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000000)) [ 393.140852] EXT4-fs (loop3): unsupported descriptor size 0 [ 393.163197] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:11:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:39 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 393.453990] ufs: You didn't specify the type of your ufs filesystem [ 393.453990] [ 393.453990] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 393.453990] [ 393.453990] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 393.495588] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue [ 393.504795] ufs: ufs_fill_super(): bad magic number 06:11:40 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 393.649636] ufs: You didn't specify the type of your ufs filesystem [ 393.649636] [ 393.649636] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 393.649636] [ 393.649636] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000000)=""/24, 0x18) [ 393.780629] EXT4-fs (loop3): unsupported descriptor size 0 [ 393.813683] ufs: ufs_fill_super(): bad magic number 06:11:40 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 393.840758] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:11:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4", 0x10, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$NLBL_MGMT_C_ADDDEF(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @local}]}, 0x1c}, 0x1, 0x0, 0x0, 0x48000}, 0x8040000) 06:11:40 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) accept4(r0, 0x0, &(0x7f00000000c0), 0x80000) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') 06:11:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, 0x0, &(0x7f0000000000)=""/24, 0x18) 06:11:40 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 394.241545] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:11:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f000004c000)=0x23, 0x4) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x2b) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0xfff7fffffffffffe, 0x7, &(0x7f00000003c0)=[{&(0x7f00000000c0)="1551ad73f9419da81b1d79aa93b8350c52888a38d4488a823669920d86a22bb22ed07e92bc143e8c857497fe3cf990b87f5fd36ed6553c0e4acafe59e54c021e2a2c07ce5740fda0349382cbc4c14db33f8f838505faf2121aaffea4947cf15462b0bccb89540e19ae82da45", 0x6c, 0x9}, {&(0x7f0000000040)="ffeada72f91b48a7baaf7e816f2c5f837d2666eda1c9451546681b40efdff492ef720d", 0x23, 0x80000000}, {&(0x7f0000000140), 0x0, 0x400}, {&(0x7f0000000180)="d428378c0e55a3d6e8a6", 0xa, 0x5}, {&(0x7f00000001c0)="46dfa3c339d1e1cfb102906e7d62d20a6540ec18547ffe4476a38a6149d47dee88b557aa56072d3987804164d9de7dc104cd20af804cab79462e9ead819b454171ebe02d42f0e6d989d03678f9195dcc006bb61cf18463e4006f27ddacf59b161aa0b3f62e64ae173bc5dd68f96a7c116377c93b0a474ac10d9cde67e8f7e929394d9d98f1c94fd46a73810435e022601fa031ab24271bd6550b45e0d1f07c463e57666b14fe3f34", 0xa8, 0x8}, {&(0x7f0000000280)="c942defcac92907b818da44120e560bb33c4de2fa444e1e5c5adb7525052a2cf", 0x20, 0x8000}, {&(0x7f00000002c0)="682cdf32e0ed7a162e2246694559ecb0d4fd26a1e7c0eb1b627b22e958c49cf150649decd0306c1ba35809021cd6eb02bc6e596103cc125d8bf6878d52a12ff9774c5d24a38447db0616fc5425e3970fe0ed17de097a552dd18fd0285340cec1e5b571ab31e492d718070971977aa9d9888f2bfb033621a359b4c7aa7f3cdc0a23902667dfabc13c3c9b9fe296315c38fba0074899cc9b5dfe6821e0fcf944901b53a174dec02590f85fe2457a58249b921c9522a039a5618eefc07e8f25d58332af98d59ad5d5bdec0c790e66903c6d83c904877e790b9ac0e9eb1fa12050c7bed0010fb94a5a895c50659ed845be4c001f60555f71e630cac31a2834fc", 0xfe, 0x7}], 0x21843, &(0x7f00000000c0)=ANY=[]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$rose(r2, &(0x7f0000000000)="4bbf6e6113376482f54eaf6aa8fd8e052cb72026e107e7f3f878896e0b85f9124a459756f238cfaaa2f88f8fdbeb6c70b2e3e92150b1ad98af71f68b79f8", 0x3e, 0x8000, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1a, &(0x7f000004c000)=0x23, 0x4) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x2b) sendmsg$inet6(r3, &(0x7f0000000840)={&(0x7f0000000140)={0xa, 0x4e20, 0xc1, @private1={0xfc, 0x1, [], 0x1}, 0x472}, 0x1c, &(0x7f00000007c0)=[{&(0x7f0000000500)="1b89b7a5665fdcda61e2a22f8f4d26bdf376ab44ece08ea174a38fed475ef3a43e1ade7fa721d60b033497b26a4afe3b6a9d2dfee13efc82d6327094559d90bdecdf120750599e2b04400f5e5eba882137aee976bd0a4dc7606cf54ae1d816fac246df3a82b99aa583d20e6b27d7d44dc3d3a18d3562bf687b1a272635f77be0596b122de1d74ca17dfeab95bb52e50962bf46bf23433bd3d81cceb8cd1c580d304f910126dbe97df0007e47bcf876e64d01ba5d08c3d8dfa66a216f82f3", 0xbe}, {&(0x7f00000005c0)="e5b2cb4507876e2763f54990466711d2a7cbfbf439bb5657c113291b2c5f99aaf5ae86a4ea4bae0f54822ce72fe000561bad5672c0280609b7fa97ae82879aacb6fdd1d2310ba0fa8f3cc05d0b6d557f7bf638b569579678d85ab554eddc4df1da2985e958756f8074ee6441d50c33c3c89a43f8880700bf75a00669477ac36bd11d97d3dabcec4da68b33bfa47f44ffa6ffd8317d7682d96cde30298f494e87f9c539038e347d8f658fc26997272b4782d630eed629be300cba977d3ec428a6c0d03f2357f9521f7822e21ee58e800a7c0987c5d1ff99da8a754573e753bea30674ab9e835bc4870ef89c2d", 0xec}, {&(0x7f00000006c0)="54339e60e7c6089dc52dfb8c0cae10f4de3d7291b7b4461089f03587e9c8596f12f65560184286c28f89ad54ab251d31c8e144ccfceefa9331037d9cecce23b302de0ae6198f91604c1b03449b37b4325e36a8441e7bf5317c92a63a6849b9a4c0ebd4123e7e35f62c6764c08cecb8a2e1cc27e755e9f1e8295e851e95eb1c7a3b6a2d42493054aeba9cb74c78106d938e89d89f9e668664b246fd96d3e7086d85de0e3dfddd5a4660c80fe8a72e639bcdb74b65380d57d8657b9c6e7d4f4c3dc5323db219922fa9211f52d6205c3c664625027e51c5e12cf2c7bf24e17b7a2ec5d4bfb17d1fd9", 0xe7}], 0x3, &(0x7f0000000800)=[@rthdr={{0x28, 0x29, 0x39, {0xff, 0x2, 0x2, 0x8, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01']}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x20}}], 0x40}, 0x48031) 06:11:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 394.464586] EXT4-fs (loop3): unsupported descriptor size 0 06:11:41 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, 0x0, 0x0) 06:11:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:41 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:41 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff0180000008003950"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:41 executing program 2: ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5514) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000100)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r3, 0x342054873468ff75}, 0x14}}, 0x0) sendmsg$SMC_PNETID_DEL(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r3, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x6000}, 0x20004000) 06:11:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, 0x0, 0x0) 06:11:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) accept4(r0, 0x0, &(0x7f00000000c0), 0x80000) [ 395.245142] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:11:41 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff0180000008003950"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 395.455219] EXT4-fs (loop3): unsupported descriptor size 0 [ 395.455589] ufs: You didn't specify the type of your ufs filesystem [ 395.455589] [ 395.455589] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 395.455589] [ 395.455589] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 395.499113] ufs: ufs_fill_super(): bad magic number 06:11:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:42 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff0180000008003950"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:42 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff01800000080039503230"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:42 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000000)=ANY=[@ANYBLOB="021133116bb1aa580a94dad3eae5276d9b4d37c01d33a91ab9486dfb27fab3073379ca0e684b99f981f41cc81a7dde4dc2c10660bcc1b5864a79cfae22aca2980ec3f5c575f19ea509c28913c83fdf6a5f138cb2db"]) [ 395.734494] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue 06:11:42 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff01800000080039503230"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0, 0x0, 0x40400}, {0x0, 0x0, 0x40803}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x404100, 0x6e) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$update(0x2, r0, 0x0, 0x0) keyctl$read(0xb, r0, 0x0, 0x0) 06:11:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x0, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 395.978060] ufs: Invalid option: "3kX [ 395.978060] 'mM73Hm'3yhK}M`JyϮ"u ‰?j_" or missing value [ 395.990290] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 396.012239] EXT4-fs (loop3): unsupported descriptor size 0 06:11:42 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff01800000080039503230"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 396.067002] ufs: wrong mount options 06:11:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0", 0x18, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x1039c) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) [ 396.234526] ufs: Invalid option: "3kX [ 396.234526] 'mM73Hm'3yhK}M`JyϮ"u ‰?j_" or missing value [ 396.314615] ufs: wrong mount options 06:11:42 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:42 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x13, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x3, 'lblc\x00', 0x15, 0x2, 0x1}, {@multicast2, 0x4e22, 0x10000, 0x1, 0xfffffff9}}, 0x44) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) 06:11:43 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 396.501626] EXT4-fs (loop3): unsupported descriptor size 0 [ 396.578714] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 396.616420] ufs: You didn't specify the type of your ufs filesystem [ 396.616420] 06:11:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 396.616420] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 396.616420] [ 396.616420] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:43 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x0, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:43 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) [ 396.717767] ufs: ufs_fill_super(): bad magic number 06:11:43 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(0xffffffffffffffff) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 396.837802] ufs: You didn't specify the type of your ufs filesystem [ 396.837802] [ 396.837802] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 396.837802] [ 396.837802] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 396.881030] EXT4-fs (loop3): unsupported descriptor size 0 06:11:43 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) [ 396.944786] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:11:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 397.039954] ufs: ufs_fill_super(): bad magic number 06:11:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x0, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 06:11:43 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) 06:11:43 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="6349bf86b9e9985c6b685cedf55b7d90e7953fac74c0d00d00a178b6d47e92020d6097", 0x23, 0x6}, {&(0x7f0000000040)="f9b176a67d52bb03970c975ebe34cc2a31b246a13169af79b14207d109cf5209e8139747ff1db5e2f045e2d183e5b7ee8fa9e086a7458c85cd1a8ee23f2b40dccd85c4019f0be89d915c6d087f53d74f6d915161db7df1828f0e5bd4adceb907060c44cacef66224c3499e7baac183a6760fb668cb123bc346a10097a40f8871e7f40506f07e55bddce301fb5c6d5fc0409b5ec6ce4f7c349edf45deced79fdd68309eb28b84e20e606ac5d445fc99da0d629980f86b75d00c76374a6ba64112b7e79b4a0414a9", 0xc7, 0x8f05}, {&(0x7f00000002c0)="e4a447223c0080000000000000ecd862d8b137c1", 0x14, 0x1}, {&(0x7f0000000180)="a122f78af0278d50bc9e1bcf9eacd2c4a9a34b80664102e640831436953ed47f5b55c8922bd864adaddf8aff8bd79fd626eb3a670f9b2fe31ff5bff1a63ec4a11cfeef94139ecc156aadaeb329af76e752b9a092e8dced8ebf1f0cb402c75d81200f8625f56dd635b1779a48ea6602e2523dbc76db2d9f999c9b252baac7a441a8f5b3bb0e3fbe95dd5eaebebccb939772db2984c3d1776f2ccffc79ccec7a66523135137f02c8fcb5f3465b", 0xac, 0xfff}], 0x800033, &(0x7f0000000300)) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000340)={0x1}) lsetxattr$security_evm(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)='security.evm\x00', &(0x7f0000000400)=@v1={0x2, "b6d857fd0e8109c8739b0ebfcd0d3b537d23a8"}, 0x14, 0x3) 06:11:43 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(0xffffffffffffffff) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:43 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) [ 397.369958] EXT4-fs (loop3): unsupported descriptor size 0 06:11:44 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(0xffffffffffffffff) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:44 executing program 2: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100)=0x8) fallocate(0xffffffffffffffff, 0x8, 0x54, 0x39a) recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/124, 0x7c, 0x40004141, &(0x7f0000000080)={0x23, 0x3f, 0x7f, 0x3f}, 0x10) 06:11:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c", 0x1c, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:44 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 06:11:44 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000180)="af0918d33b2ef33e6b8982f63df3f6e7da4002b98578fc868ff94110f8c1e543a544f285f101f746e02d0716e5d6be6d25da7642516c71979a5b0bcb4d659496ee6cbbbe4a8b52576faa86bed2bcbbc602b3afe4e7670bfe14743c7844040e4b0417bfd9fb18cf8b07fbad2a2734749997694eaf73b0574c2bcc3961ed487a350f0049", 0x83, 0x101}, {&(0x7f00000000c0)="22eae47e0aed607efe0806f3a6f71ded728446f1651f6ba989f97278a31676a032eff353ae53d938db07669fdd652f4bb52c54f528afb6544b7f9b7008cb6dbe5418377f5e91a6728a6a", 0x4a}], 0x302020, &(0x7f0000000900)) [ 397.662273] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:11:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 397.717938] EXT4-fs (loop3): unsupported descriptor size 0 06:11:44 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 06:11:44 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 06:11:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:44 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:44 executing program 2: r0 = getuid() syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000080)={[], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@euid_eq={'euid', 0x3d, r0}}, {@dont_appraise='dont_appraise'}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, 'dont_appraise'}}]}) [ 398.120056] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:11:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 398.187190] ufs: Invalid option: "euid=00000000000000000000" or missing value 06:11:44 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) [ 398.234335] ufs: wrong mount options 06:11:44 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="1d702060c09f35b112a789a9463a8feea15a4eed3bae0b35b6d7df722bb513a9b1fe0b8d489c4c88f84a3c37561a81043130fa29d324502410d3451e94f0c3cbc1b327779f7231adbe040bc51184ecf40a7d02032436706f5142a9ab0f096716b60717a026ef2e8614e6f72d3fa8e8b24fb1847d192b71cd61d161827b68a976549b61239a5e9464455abb1d43755992f45e5ae4feaf33bf64f09114d9a8095a267bb92c011d3cc487f4fcbc9aef88d7d262", 0xb2, 0x6}], 0x800013, &(0x7f0000000000)={[], [{@smackfshat={'smackfshat', 0x3d, 'ufs\x00'}}, {@seclabel='seclabel'}, {@appraise_type='appraise_type=imasig'}, {@obj_user={'obj_user', 0x3d, 'ufs\x00'}}]}) 06:11:44 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:44 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) [ 398.351177] EXT4-fs (loop3): unsupported descriptor size 0 [ 398.500831] ufs: Invalid option: "smackfshat=ufs" or missing value 06:11:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 398.555657] ufs: wrong mount options 06:11:45 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 398.670280] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 398.676724] ufs: Invalid option: "smackfshat=ufs" or missing value [ 398.685567] ufs: wrong mount options [ 398.791723] EXT4-fs (loop3): unsupported descriptor size 0 06:11:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 06:11:45 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) 06:11:45 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)=ANY=[@ANYBLOB="df"]) 06:11:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x0) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:45 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c0100", 0x1e, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:45 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) [ 399.128099] ufs: Invalid option: "" or missing value [ 399.145225] ufs: wrong mount options 06:11:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 06:11:45 executing program 2: syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000000)=ANY=[@ANYBLOB="0088510a7a3d1dffc00cf70665ded1147ca9a635da10c545980ff4385510a09dba030ba2654ae2a942345b9dc7390140d29140f7545e01e98d28a80e0e51f4ce5e143a819fefdcaa3b71549695ac07bcb96fd73f62ad7a118cb966e0f84666e306e81c878e83858f4270d28b3ff0dc927d8ac12a3c3acbe5"]) 06:11:46 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 399.431003] EXT4-fs (loop3): unsupported descriptor size 0 [ 399.439328] ufs: You didn't specify the type of your ufs filesystem [ 399.439328] [ 399.439328] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 399.439328] [ 399.439328] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 399.497115] ufs: ufs_fill_super(): bad magic number [ 399.530095] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:11:46 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x8) 06:11:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, 0x0, 0x0) 06:11:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:46 executing program 2: r0 = syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$BLKRRPART(r1, 0x125f, 0x0) 06:11:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 06:11:46 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x8) 06:11:46 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:46 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) [ 399.774084] ufs: You didn't specify the type of your ufs filesystem [ 399.774084] [ 399.774084] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 399.774084] [ 399.774084] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old [ 399.837840] ufs: ufs_fill_super(): bad magic number 06:11:46 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x8) 06:11:46 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 399.951849] ufs: You didn't specify the type of your ufs filesystem [ 399.951849] [ 399.951849] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 399.951849] [ 399.951849] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:46 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) [ 400.025427] ufs: ufs_fill_super(): bad magic number 06:11:46 executing program 2: r0 = syz_mount_image$btrfs(&(0x7f0000000440)='btrfs\x00', &(0x7f0000000040)='./file1\x00', 0x6, 0x9, &(0x7f0000000540)=[{&(0x7f0000000080)="acea4d1699a712270ff3b16325c0f55d30801865e9205b778179015c960f4ec29208feddc309ccb726b0de1f2a9345ecf7adf473f1dbaee223bef4a3fad8772407204391e15c3b98f88ecb785afff1a79c0b9ce9c478a9f994e6d0d7a72f647191036283e4e0a2de3b10ea66b739c6f34a53b534a6bdb92951b0ecb171a39865dd7c176d85dec89b0acd1f37cc2678169ffcfaf6f0ed7c434130fd06074b040103154a19ee4606ff6618ba63d2f870b02ec8c0355e8256a20d9965dcd0a8e7a25813b737873b9145ffd267e39061a01c3814276161fa4e55c39fbaa357527ecdd4bf7bab28973673390f2b3201a2cec4365c97a58d25bc9852", 0xf9, 0x3f}, {&(0x7f0000000940)="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", 0x1000, 0x9}, {&(0x7f0000000180)="54ac635016819b829b7b7fba5a92e1d3802069b67c5e4bfa3524e783f13aa83a7319f6cc8dbfc57b513eb92aa2088205bcf8f77b90939f4902ca6dbd112970180dd8f2ebcda9cb7b1f15f6163c37889eceb5dc21a20136f6a111f88d03808d22bd65e1459c4a2fbbe7b6b55f25bbe3ca5e35b28b7c739e51fa93039cabf64a89afaceb453b227f6bc4449ffb59bb9c526415845293adddfb6f504848b790daf9934bba3dab012e91b40d94748a87c53a80c2ef8e516cec9150868d7fe11bc3288bca7c70d36492547abe7894648ca4fd362bb6264330056d9ea74d67ef6ce527a5a3e02e4b01a8b9", 0xe8, 0x7}, {&(0x7f0000000280)="f15770e308e10da3b4ad3c2b6ef86602c57da0a0787160312575a4d836cad31917e6dbb5be4d5914d25a245a90976ed445bb1d8fe57acf46bf433c3cec53d222e8dd16762e902c2abb1cb186cbc5e11e49985ece7f4c3c2bb64e652138ec4f43793f666fc7", 0x65}, {&(0x7f0000000300)="52fe83be72c8a09713dbd438dcd6435891ea21c90f775019c3c21c4c3b8b1742d0389b4747", 0x25, 0x1ff}, {&(0x7f0000000340)="44016e5826609f8b4ce3df429f2cdade45e908a79b09d9645f0cbec4a6c414b062d4115a28a14a927f97d1bfbcffec363091a1e213157cb8600cc0afc244a5570e77a9909d471a493c0b8a6ae37c7e568cfe898d70c3290c32401b80f77f36ac89c7ef6f7924f0b495d7cd437bf786371617acb09a74adb1c61c67c3600bad6772b7570484472126816821559581091357206aec4f510ff56ede343cfddd940f038417a55048e070334ea8ff1fcc7abd21b0050978374d85a3e2164d2fc1", 0xbe, 0x7fffffff}, {&(0x7f0000000400)="a5538d2e754c58340ba773421c5b379826d4b785486d3f7f93", 0x19, 0xffffffff}, {&(0x7f0000000680)="56147127ce6d01bdc649cc935c3d296e1da68388989e794542e4d9baa003408ef8e8a6361de9fe2c021397c93f6e787d3783ce720dab93cb8aa13375d4f56fa0546dd3aff25c33f5f29973c8add2eca2f23b85e7e9fcc88beb85f7914c883bab952264416a7c3c5c6b73838b77ee8451629aaaa8d9c955fc7ed8e86e6a8fbe69acc423f0e36e40675be2c099ea9db946cbfe8fa771ced8e3de3e1535731e73dc6205df5d3f9aa3ee0a20eeb925125c", 0xaf, 0x100000000}, {&(0x7f0000000500)="403039d88e4181afbffa9d6626a8f0d792e84a5faf74c4331bee78e7a2eb8fb65dc5de74b26b", 0x26, 0x7}], 0x21, &(0x7f00000007c0)={[{@inode_cache='inode_cache'}, {@rescan_uuid_tree='rescan_uuid_tree'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'ufs\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'btrfs\x00'}}]}) fsync(r0) ioctl$SNDCTL_SEQ_SYNC(0xffffffffffffffff, 0x5101) syz_mount_image$ufs(&(0x7f0000000480)='ufs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000840), 0x800013, &(0x7f0000000900)) [ 400.060324] EXT4-fs (loop3): unsupported descriptor size 0 [ 400.133541] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:11:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, 0x0, 0x0) 06:11:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:46 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:46 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) [ 400.341405] ufs: You didn't specify the type of your ufs filesystem [ 400.341405] [ 400.341405] mount -t ufs -o ufstype=sun|sunx86|44bsd|ufs2|5xbsd|old|hp|nextstep|nextstep-cd|openstep ... [ 400.341405] [ 400.341405] >>>WARNING<<< Wrong ufstype may corrupt your filesystem, default is ufstype=old 06:11:46 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) [ 400.484674] ufs: ufs_fill_super(): bad magic number 06:11:47 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:47 executing program 2: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0xee6833998d1678aa}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x8000) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x6c, &(0x7f0000000000)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x36, 0x3a, 0x0, @initdev={0xfe, 0x88, [0x0, 0x2], 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '$\x00@', 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}, @loopback, [], "050c68deb1ca"}}}}}}}, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 06:11:47 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 06:11:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8) [ 400.747318] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 06:11:47 executing program 2: sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) sendmsg$NLBL_CIPSOV4_C_LISTALL(0xffffffffffffffff, 0x0, 0x40400) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0xee6833998d1678aa}, 0x4004044) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x8000) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x6e, &(0x7f0000000000)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "d64d4d", 0x38, 0x3a, 0x0, @initdev={0xfe, 0x88, [0x0, 0x2], 0x0, 0x0}, @mcast2, {[], @dest_unreach={0x2, 0x0, 0x0, 0x0, [], {0x0, 0x6, '$\x00@', 0x0, 0x3a, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x16]}, @loopback, [], "050c68deb1caadea"}}}}}}}, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) [ 400.838089] EXT4-fs (loop3): unsupported descriptor size 0 06:11:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:47 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 06:11:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8) 06:11:47 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='pstore\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x84420, &(0x7f00000000c0)) 06:11:47 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:47 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 06:11:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8) 06:11:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}, 0xfffffffe}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000b40)=""/160, 0xa0}, {&(0x7f0000000cc0)=""/96, 0x60}, {&(0x7f0000000e40)=""/217, 0xd9}], 0x3, &(0x7f0000001100)=""/102, 0x66}}, {{0x0, 0x0, 0x0}}], 0x3, 0x22, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000003c0)={0x0, 0x2, 0x1000, 0x2}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000003240)='nl80211\x00') sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f00000002c0)=""/110) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) writev(r4, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9623b", 0x8b}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a94", 0x8d}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r4, &(0x7f00000012c0)="1a268a927f1f6588b967481241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 06:11:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/rt_acct\x00') sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d00000000", 0x1c) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 06:11:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 06:11:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) [ 401.274359] EXT4-fs (loop3): unsupported descriptor size 0 06:11:47 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 06:11:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) 06:11:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) 06:11:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) [ 401.778883] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 06:11:48 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, 0x0, &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:48 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) 06:11:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_procfs(0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000000380)="1c0000001a009bae5700af0f550000adf86e28000000008d00000000", 0x1c) recvmmsg(r2, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 06:11:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080), 0x10) 06:11:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capget(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)) perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0xff, 0xa1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x0, 0x2}, 0x20, 0x0, 0x3, 0x2, 0x2, 0x6, 0x86}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x3fc, 0x0) flock(r1, 0x1) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) flock(r2, 0x2) 06:11:49 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, 0x0, &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:49 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) 06:11:49 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, 0x0, &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736617e43c00088020000200000004fc000020004000000000000000000001", 0x25}, {&(0x7f0000010400)="f8ffff0fffffff0fffffff0f", 0xc, 0x10000}], 0x0, &(0x7f0000011000)) [ 403.180519] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 06:11:49 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:49 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000126ad7000fddbdf25100000000c00098008000100acb0200e"], 0x20}, 0x1, 0x0, 0x0, 0x10}, 0xc080) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbee6, 0x8031, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000180)={0x0, 0x5, 0xde6e}) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40007, 0x0}}], 0x4000000000003be, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 06:11:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x9, &(0x7f0000000200)=[{&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:49 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 403.475410] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 06:11:50 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:11:50 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:50 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:11:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00007, 0x2, &(0x7f0000000200)=[{&(0x7f00000000c0)="040000090000ac47e66174000404090a0200027400f8", 0x16}, {&(0x7f00000003c0)="dfc1ea0eb8491c1b98ba", 0xa, 0x1b}], 0x0, &(0x7f0000000400)=ANY=[]) creat(0x0, 0x0) statfs(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)=""/79) 06:11:50 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) [ 404.185474] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 06:11:50 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 404.296268] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 404.523067] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 407.152899] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 407.163472] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 407.173597] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 407.181314] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 407.190800] device bridge_slave_1 left promiscuous mode [ 407.197426] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.208361] device bridge_slave_0 left promiscuous mode [ 407.213863] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.228581] device veth1_macvtap left promiscuous mode [ 407.234634] device veth0_macvtap left promiscuous mode [ 407.240338] device veth1_vlan left promiscuous mode [ 407.247186] device veth0_vlan left promiscuous mode [ 410.525418] Bluetooth: hci2: command 0x0409 tx timeout [ 412.333837] device hsr_slave_1 left promiscuous mode [ 412.341956] device hsr_slave_0 left promiscuous mode [ 412.358037] team0 (unregistering): Port device team_slave_1 removed [ 412.369734] team0 (unregistering): Port device team_slave_0 removed [ 412.382612] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 412.397198] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 412.436064] bond0 (unregistering): Released all slaves [ 412.461499] IPVS: ftp: loaded support on port[0] = 21 [ 412.597004] chnl_net:caif_netlink_parms(): no params data found [ 412.614105] Bluetooth: hci2: command 0x041b tx timeout [ 412.726597] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.733057] bridge0: port 1(bridge_slave_0) entered disabled state [ 412.748567] device bridge_slave_0 entered promiscuous mode [ 412.760561] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.771307] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.784583] device bridge_slave_1 entered promiscuous mode [ 412.822125] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 412.834313] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 412.871472] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 412.885114] team0: Port device team_slave_0 added [ 412.894293] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 412.908590] team0: Port device team_slave_1 added [ 412.940610] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 412.951052] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 412.984321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 413.002669] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 413.009304] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 413.040034] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 413.051665] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 413.064937] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 413.106385] device hsr_slave_0 entered promiscuous mode [ 413.112573] device hsr_slave_1 entered promiscuous mode [ 413.124787] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 413.132828] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 413.293256] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.299813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 413.306777] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.313272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 413.393828] 8021q: adding VLAN 0 to HW filter on device bond0 [ 413.410032] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 413.427224] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 413.434755] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.449236] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.466939] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 413.473036] 8021q: adding VLAN 0 to HW filter on device team0 [ 413.486554] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 413.493811] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 413.509667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 413.538191] bridge0: port 1(bridge_slave_0) entered blocking state [ 413.545459] bridge0: port 1(bridge_slave_0) entered forwarding state [ 413.563043] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 413.571239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 413.581774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 413.606166] bridge0: port 2(bridge_slave_1) entered blocking state [ 413.612894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 413.624651] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 413.633285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 413.649357] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 413.657441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 413.670346] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 413.678996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 413.689321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 413.703421] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 413.712749] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 413.720905] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 413.730315] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 413.742833] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 413.749885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 413.758726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 413.770173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 413.778741] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 413.787551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 413.799406] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 413.806361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 413.819952] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 413.828625] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 413.835019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 413.842739] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 413.855674] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 413.872840] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 413.882712] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 413.890497] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 413.901756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 413.935407] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 413.942970] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 413.951191] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 413.961127] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 413.968160] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 413.976728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 413.989178] device veth0_vlan entered promiscuous mode [ 413.995713] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 414.003649] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 414.015827] device veth1_vlan entered promiscuous mode [ 414.021745] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 414.033343] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 414.046431] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 414.056426] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 414.063675] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 414.071665] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 414.079322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 414.087517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 414.098339] device veth0_macvtap entered promiscuous mode [ 414.106381] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 414.116136] device veth1_macvtap entered promiscuous mode [ 414.123092] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 414.133349] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 414.146015] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 414.155075] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 414.164882] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.174289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 414.184616] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.194059] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 414.204962] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.215538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 414.225472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.234585] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 414.244426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.255955] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 414.262947] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 414.269994] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 414.278402] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 414.286146] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 414.294149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 414.305768] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.316217] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.326289] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.336745] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.346500] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.356781] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.366667] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.377175] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.386819] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 414.397736] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 414.408412] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 414.416577] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 414.423920] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 414.432604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 414.564101] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready [ 414.586388] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 414.593714] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 414.608359] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready [ 414.614806] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 414.626479] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 414.633296] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 414.646495] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 414.685829] Bluetooth: hci2: command 0x040f tx timeout 06:12:01 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x5, 0x4, 0x3, 0x0, 0x96f3}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0x8, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xe58}, 0x0, 0x0, 0x2000000, 0x4, 0x0, 0x0, 0x401}, 0x0, 0x9, 0xffffffffffffffff, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000100)=[0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0xffff, 0xffffffffffffffff, &(0x7f0000000480)="1156fb36251fe8b61331dcc073c038c006922b4b57d6d8588ad2c5c3b1a0810a68a795d3567c6c5b39c90dc44a4cdb4fc4c81d8adf599216e4ec502da03ba4e9ce22152db1063a1b18ce33a0c44db4143e0bef5944be83b25dddfe10c91ddaba60063f9be8c7f573091fe911265efefb5f353517db1875870000af661dacb7c2f84f4f", 0x83, 0xa, 0x0, 0x3}]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) clone(0x64000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000540)="75200cdc2da9700483b2c3caf9fadc2ae55cf3fd58d9d3e3f03893464e49dea9b1838e53931c7d4d8cecec4cee5443b4acb627f53ba8b50796828f68e820d48305e8b48520f6eb437f99aa04381bd2c10f05dda0ce06d677c5335d9cc7a3f16dfba1f83a0b925a54c1", 0x69}, {&(0x7f0000000140)="019b7043f1bab03fb0bfdd4ef3e1322fddd284a1754e6d4053544f9dc7080dd239ca989e6b5d1c48127e9b494ffb26fa0929bae51bacc918f01cc4", 0x3b}], 0x3}}], 0x2, 0x0) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffad) 06:12:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, 0x0, 0xc080) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbee6, 0x10, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40007, 0x0}}], 0x4000000000003be, 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) 06:12:01 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=']) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) 06:12:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x9) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000126ad7000fddbdf25100000000c00098008000100acb0200e"], 0x20}, 0x1, 0x0, 0x0, 0x10}, 0xc080) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbee6, 0x8031, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000180)={0x0, 0x5, 0xde6e}) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40007, 0x0}}], 0x4000000000003be, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 414.729868] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 06:12:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) [ 414.874812] 9pnet: Insufficient options for proto=fd 06:12:01 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=']) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 415.092714] 9pnet: Insufficient options for proto=fd [ 415.149446] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:12:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) [ 415.273197] IPVS: ftp: loaded support on port[0] = 21 06:12:02 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=']) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:02 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x5, 0x4, 0x3, 0x0, 0x96f3}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0x8, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xe58}, 0x0, 0x0, 0x2000000, 0x4, 0x0, 0x0, 0x401}, 0x0, 0x9, 0xffffffffffffffff, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000100)=[0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0xffff, 0xffffffffffffffff, &(0x7f0000000480)="1156fb36251fe8b61331dcc073c038c006922b4b57d6d8588ad2c5c3b1a0810a68a795d3567c6c5b39c90dc44a4cdb4fc4c81d8adf599216e4ec502da03ba4e9ce22152db1063a1b18ce33a0c44db4143e0bef5944be83b25dddfe10c91ddaba60063f9be8c7f573091fe911265efefb5f353517db1875870000af661dacb7c2f84f4f", 0x83, 0xa, 0x0, 0x3}]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) clone(0x64000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000540)="75200cdc2da9700483b2c3caf9fadc2ae55cf3fd58d9d3e3f03893464e49dea9b1838e53931c7d4d8cecec4cee5443b4acb627f53ba8b50796828f68e820d48305e8b48520f6eb437f99aa04381bd2c10f05dda0ce06d677c5335d9cc7a3f16dfba1f83a0b925a54c1", 0x69}, {&(0x7f0000000140)="019b7043f1bab03fb0bfdd4ef3e1322fddd284a1754e6d4053544f9dc7080dd239ca989e6b5d1c48127e9b494ffb26fa0929bae51bacc918f01cc4", 0x3b}], 0x3}}], 0x2, 0x0) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffad) 06:12:02 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) [ 415.653555] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 415.722445] 9pnet: Insufficient options for proto=fd 06:12:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:02 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) [ 416.061396] IPVS: ftp: loaded support on port[0] = 21 06:12:02 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x5, 0x4, 0x3, 0x0, 0x96f3}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0x8, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xe58}, 0x0, 0x0, 0x2000000, 0x4, 0x0, 0x0, 0x401}, 0x0, 0x9, 0xffffffffffffffff, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000100)=[0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0xffff, 0xffffffffffffffff, &(0x7f0000000480)="1156fb36251fe8b61331dcc073c038c006922b4b57d6d8588ad2c5c3b1a0810a68a795d3567c6c5b39c90dc44a4cdb4fc4c81d8adf599216e4ec502da03ba4e9ce22152db1063a1b18ce33a0c44db4143e0bef5944be83b25dddfe10c91ddaba60063f9be8c7f573091fe911265efefb5f353517db1875870000af661dacb7c2f84f4f", 0x83, 0xa, 0x0, 0x3}]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) clone(0x64000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000540)="75200cdc2da9700483b2c3caf9fadc2ae55cf3fd58d9d3e3f03893464e49dea9b1838e53931c7d4d8cecec4cee5443b4acb627f53ba8b50796828f68e820d48305e8b48520f6eb437f99aa04381bd2c10f05dda0ce06d677c5335d9cc7a3f16dfba1f83a0b925a54c1", 0x69}, {&(0x7f0000000140)="019b7043f1bab03fb0bfdd4ef3e1322fddd284a1754e6d4053544f9dc7080dd239ca989e6b5d1c48127e9b494ffb26fa0929bae51bacc918f01cc4", 0x3b}], 0x3}}], 0x2, 0x0) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffad) 06:12:02 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:02 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x5, 0x4, 0x3, 0x0, 0x96f3}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0x8, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xe58}, 0x0, 0x0, 0x2000000, 0x4, 0x0, 0x0, 0x401}, 0x0, 0x9, 0xffffffffffffffff, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000100)=[0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0xffff, 0xffffffffffffffff, &(0x7f0000000480)="1156fb36251fe8b61331dcc073c038c006922b4b57d6d8588ad2c5c3b1a0810a68a795d3567c6c5b39c90dc44a4cdb4fc4c81d8adf599216e4ec502da03ba4e9ce22152db1063a1b18ce33a0c44db4143e0bef5944be83b25dddfe10c91ddaba60063f9be8c7f573091fe911265efefb5f353517db1875870000af661dacb7c2f84f4f", 0x83, 0xa, 0x0, 0x3}]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) clone(0x64000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000540)="75200cdc2da9700483b2c3caf9fadc2ae55cf3fd58d9d3e3f03893464e49dea9b1838e53931c7d4d8cecec4cee5443b4acb627f53ba8b50796828f68e820d48305e8b48520f6eb437f99aa04381bd2c10f05dda0ce06d677c5335d9cc7a3f16dfba1f83a0b925a54c1", 0x69}, {&(0x7f0000000140)="019b7043f1bab03fb0bfdd4ef3e1322fddd284a1754e6d4053544f9dc7080dd239ca989e6b5d1c48127e9b494ffb26fa0929bae51bacc918f01cc4", 0x3b}], 0x3}}], 0x2, 0x0) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffad) [ 416.463842] 9pnet: Insufficient options for proto=fd [ 416.545548] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 416.665512] IPVS: ftp: loaded support on port[0] = 21 [ 416.740483] IPVS: ftp: loaded support on port[0] = 21 [ 416.811470] Bluetooth: hci2: command 0x0419 tx timeout 06:12:04 executing program 4: capget(&(0x7f00000000c0), 0x0) timer_create(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x3fc, 0x0) flock(r0, 0x1) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) 06:12:04 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) 06:12:04 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:04 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x5, 0x4, 0x3, 0x0, 0x96f3}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0x8, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xe58}, 0x0, 0x0, 0x2000000, 0x4, 0x0, 0x0, 0x401}, 0x0, 0x9, 0xffffffffffffffff, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000100)=[0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0xffff, 0xffffffffffffffff, &(0x7f0000000480)="1156fb36251fe8b61331dcc073c038c006922b4b57d6d8588ad2c5c3b1a0810a68a795d3567c6c5b39c90dc44a4cdb4fc4c81d8adf599216e4ec502da03ba4e9ce22152db1063a1b18ce33a0c44db4143e0bef5944be83b25dddfe10c91ddaba60063f9be8c7f573091fe911265efefb5f353517db1875870000af661dacb7c2f84f4f", 0x83, 0xa, 0x0, 0x3}]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) clone(0x64000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000540)="75200cdc2da9700483b2c3caf9fadc2ae55cf3fd58d9d3e3f03893464e49dea9b1838e53931c7d4d8cecec4cee5443b4acb627f53ba8b50796828f68e820d48305e8b48520f6eb437f99aa04381bd2c10f05dda0ce06d677c5335d9cc7a3f16dfba1f83a0b925a54c1", 0x69}, {&(0x7f0000000140)="019b7043f1bab03fb0bfdd4ef3e1322fddd284a1754e6d4053544f9dc7080dd239ca989e6b5d1c48127e9b494ffb26fa0929bae51bacc918f01cc4", 0x3b}], 0x3}}], 0x2, 0x0) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffad) 06:12:04 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x5, 0x4, 0x3, 0x0, 0x96f3}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0x8, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xe58}, 0x0, 0x0, 0x2000000, 0x4, 0x0, 0x0, 0x401}, 0x0, 0x9, 0xffffffffffffffff, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000100)=[0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0xffff, 0xffffffffffffffff, &(0x7f0000000480)="1156fb36251fe8b61331dcc073c038c006922b4b57d6d8588ad2c5c3b1a0810a68a795d3567c6c5b39c90dc44a4cdb4fc4c81d8adf599216e4ec502da03ba4e9ce22152db1063a1b18ce33a0c44db4143e0bef5944be83b25dddfe10c91ddaba60063f9be8c7f573091fe911265efefb5f353517db1875870000af661dacb7c2f84f4f", 0x83, 0xa, 0x0, 0x3}]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) clone(0x64000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000540)="75200cdc2da9700483b2c3caf9fadc2ae55cf3fd58d9d3e3f03893464e49dea9b1838e53931c7d4d8cecec4cee5443b4acb627f53ba8b50796828f68e820d48305e8b48520f6eb437f99aa04381bd2c10f05dda0ce06d677c5335d9cc7a3f16dfba1f83a0b925a54c1", 0x69}, {&(0x7f0000000140)="019b7043f1bab03fb0bfdd4ef3e1322fddd284a1754e6d4053544f9dc7080dd239ca989e6b5d1c48127e9b494ffb26fa0929bae51bacc918f01cc4", 0x3b}], 0x3}}], 0x2, 0x0) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffad) 06:12:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 417.781805] 9pnet: Insufficient options for proto=fd [ 417.978235] IPVS: ftp: loaded support on port[0] = 21 [ 418.007830] IPVS: ftp: loaded support on port[0] = 21 06:12:04 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) 06:12:04 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:04 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x5, 0x4, 0x3, 0x0, 0x96f3}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0x8, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xe58}, 0x0, 0x0, 0x2000000, 0x4, 0x0, 0x0, 0x401}, 0x0, 0x9, 0xffffffffffffffff, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000100)=[0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0xffff, 0xffffffffffffffff, &(0x7f0000000480)="1156fb36251fe8b61331dcc073c038c006922b4b57d6d8588ad2c5c3b1a0810a68a795d3567c6c5b39c90dc44a4cdb4fc4c81d8adf599216e4ec502da03ba4e9ce22152db1063a1b18ce33a0c44db4143e0bef5944be83b25dddfe10c91ddaba60063f9be8c7f573091fe911265efefb5f353517db1875870000af661dacb7c2f84f4f", 0x83, 0xa, 0x0, 0x3}]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) clone(0x64000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000540)="75200cdc2da9700483b2c3caf9fadc2ae55cf3fd58d9d3e3f03893464e49dea9b1838e53931c7d4d8cecec4cee5443b4acb627f53ba8b50796828f68e820d48305e8b48520f6eb437f99aa04381bd2c10f05dda0ce06d677c5335d9cc7a3f16dfba1f83a0b925a54c1", 0x69}, {&(0x7f0000000140)="019b7043f1bab03fb0bfdd4ef3e1322fddd284a1754e6d4053544f9dc7080dd239ca989e6b5d1c48127e9b494ffb26fa0929bae51bacc918f01cc4", 0x3b}], 0x3}}], 0x2, 0x0) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffad) 06:12:04 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x81, 0xa8a1}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003c00)=""/200, 0xc8}, 0x20000}], 0x1, 0x10003, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x5, 0x4, 0x3, 0x0, 0x96f3}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace(0x8, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xe58}, 0x0, 0x0, 0x2000000, 0x4, 0x0, 0x0, 0x401}, 0x0, 0x9, 0xffffffffffffffff, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x2, &(0x7f0000000100)=[0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x6, 0xffff, 0xffffffffffffffff, &(0x7f0000000480)="1156fb36251fe8b61331dcc073c038c006922b4b57d6d8588ad2c5c3b1a0810a68a795d3567c6c5b39c90dc44a4cdb4fc4c81d8adf599216e4ec502da03ba4e9ce22152db1063a1b18ce33a0c44db4143e0bef5944be83b25dddfe10c91ddaba60063f9be8c7f573091fe911265efefb5f353517db1875870000af661dacb7c2f84f4f", 0x83, 0xa, 0x0, 0x3}]) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000180), 0x4) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f0000003c80), 0x38e, 0x62, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f0000000040)) clone(0x64000103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000540)="75200cdc2da9700483b2c3caf9fadc2ae55cf3fd58d9d3e3f03893464e49dea9b1838e53931c7d4d8cecec4cee5443b4acb627f53ba8b50796828f68e820d48305e8b48520f6eb437f99aa04381bd2c10f05dda0ce06d677c5335d9cc7a3f16dfba1f83a0b925a54c1", 0x69}, {&(0x7f0000000140)="019b7043f1bab03fb0bfdd4ef3e1322fddd284a1754e6d4053544f9dc7080dd239ca989e6b5d1c48127e9b494ffb26fa0929bae51bacc918f01cc4", 0x3b}], 0x3}}], 0x2, 0x0) socket$inet6(0xa, 0x803, 0x2) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffffad) 06:12:04 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) [ 418.320213] 9pnet: Insufficient options for proto=fd [ 418.420288] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 418.514420] IPVS: ftp: loaded support on port[0] = 21 06:12:05 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:05 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000006480)=[{{&(0x7f0000000000)=@caif=@dgm={0x25, 0x5bffa8b2, 0x2f}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000300)="37086ae30bd69f6538e1f6af71295e3b53184c613e5b157ff81934f97af22c3bc6db4f9551595b840ae6f69a0f5c9aeb7b35da7474e2924a9ca88836a46e18677b8a9156d66d00ab333926967b9ec50c18a669ac24010e836d36cfde2e96a4202a7a9f5a6139fa0ea821d03dca8249739cb9f12d0946ab030c5abcf1ceb65d0208b8cb212e2e2fe7ee6200ccd699e71c3e04d329b96b0f9e206c20a08a4674c2b204f5ffcf6604a11ea4d09420e7d03f45effff872bba022b0865ab74dcbe2", 0xbf}, {&(0x7f0000000500)="457eb44257b77310c0968f1de01648ae103fcb1adac93542fcada812f29ee98658357be8fb058391c4fbf09eb5a4f8414647e5ea5a6e7b5fad95453ac261379069c878d69b5720f73dc5da02f5cbd828394639fb3784b0cda5920a39f9f620916f92b43e1dbb994f58149f09dbef5331905bddb930c4029e89d606fc44704d85210a447303548effb85f8a69d839f03b24786a2dcfed68d8903746c617674220651e4959856aa0d2cf9ba353713f99fc02144fcccb4cdfbeb5bdc1c74d10bc32ba2c02049d5074740424833a23d7941b", 0xd0}, {&(0x7f00000003c0)="f3ff6579e431a5bf92c4565c7b282d9b194e88ed8e7482b33888049138c31f2cebe1f970b23bdbaa90a8ea1fe83f71d818d57446079fb4a6a271c097ab54a5f1f7ce2507990002be6626b391ea1419240d2c1a335cd77442cd4443918b0f0cfff0f3dc6afbd3d2", 0x67}, {&(0x7f0000000600)="ae213d140630da41d816963be5bab71cfeea8046855248967fc23800321c2c89a5bebec846912369ae0dd3094ad7e0eef34ec1190bc09740cf4de4b19af74383b7ea12903b946df33c9f9d6c2fe2aa14d6d336defa7670c13bb252ab4888e0290f415a1e2f4f0a9208ce5e880160a4026a7f8e82a3795fd97e84d5cc498dcf8f371ae892546eaa51d633d658c51a5bb3c94597a62e0f944e3af8fcaaa8939ca19e61257189f2689f339e9f7aac43849fdcfdc6274d2ea99dbbbfbd6da2195859b37e3092255926f9891b40ef055df40345a4101649b8831ce2cf03f96e6a03a4797863cc82d421debd880865d79ca68365b76514cd8533", 0xf7}, {&(0x7f0000000700)="53fd62bbb68ff648878bde72039111813a8ff4b9fe453d9e213687c2d1fcf25e704e88b19c4adace2ffefac8aa000a9082ce8f50fc42d153cffe93616ced9ef10a81b25cc97fd779a7f694f4bc9cc36011dfa238ace77cf830597626eedb6e9b4d33b169a40c4b673cfe56d111c7e133f018864a7dac01387aa0572b868e42d674f0923a599b22", 0x87}, {&(0x7f0000000080)="36e2971b72cedce96b5369bfe269ab43700d9e6f5475bcad5fc25ecc004f66a2", 0x20}], 0x6}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f0000000840)="5c35126bd591da869edbb6c255070c2fd6c0735bece1fd62e471a7b4143d8d8e5810f68b97f3af8144e2f22573d948d1fdb1cdab04bf775e3d184d56d49057d3277ca88edb38952be83476d38657a1b9ad256a60fce0e0e092afe7d3bc99dbfbd6b09b43bb202f0ca6b7ca54fc01c4bc153a8462e96426dd930ea0974643fafd24f42a235ce28523d5f0f296cf08a390858cf677b0d3bc68e922a18d8720fac87fc47fa10d116388b3f685e89807be34e4", 0xb1}, {&(0x7f0000000240)="5b09b90d378a5068c7f104d633ee6886a2f6ccadc2509f67918a1a332334b2d3226ac000c1317b94349c16e0bfc77328", 0x30}, {&(0x7f0000000900)="15fbe1cd226669568076e1afd720a9f5f9e7d8dd00db0ff2e1eb8f0ad634a0362e61185b634e9b2fe5fae5163b7b16ebf9b6ede549cb24659430376575c66b707f065ed1803398125ad8e5df86c2b2db42d5b28d43fba7b0a196180d80754a571e8d4cad9b90cd8d017cbb18492d3d5e06b4db9c150725f71c66f1aa093df9a6082ec159848f7b57489eef08f4f73a50c23100dec4de1842b3c1732f87a78d753d274c92bd7a1546f36c8ff7ce9dd54552a6a911d05457100868223279dc6839d0366f564dda0e74f72b3a7a0f985598ee6726f917f919424e299d0ced6ef92bef94f9", 0xe3}, {&(0x7f0000000a00)="2662535fe58ab3607126caa88bfb9f71210de8c37331f5a5763abe94229e683226a697921c91f200c791daaaef9d6ae6c77a3622af8d975318da4f700dc7b96f765d2593553416229cdd3584322a2345818b476b4563c23cb3918c", 0x5b}, {&(0x7f0000000a80)="748ca19956276b910098c25a91b6e8f6ecf30174fcc52c4e9f692c5d1fb2e251fd9870645d005976d981c4b1f9092f5f9678ca7ee9378e26edda07c4fce26a9ef21c1354ceddd94c96eb3a5c8b7ad5756dc21d09af59957aa0e7a7bb95a52325529d26e940658f1f34471eecb35574a2664ed1", 0x73}, {&(0x7f0000000b00)="141dd30732002e871c7d9828f610bd2dd2822f59bc49cb801d4312e7b60a4ba8c67e362fc7623fa6327bf619bdd65788adfff55194d7befe3491a190562487478908e795e694fbba9b22caa714b29375baebe1c961df23e135af25892def265b11bd9e03635045d030d83672a4fc5e", 0x6f}, {&(0x7f0000000b80)="e8a00d2611d9c1768eaa734d9113fcdbd60dee4a9f86239abbae5fb5ae7b1e18852dfcb452becc75a811a281581d9a94deea7cd85573840b5c554a82ebdd75036f485e2644f88fe32c0d8a5250ec0a30ab79b8f212126492ad32a7af79cf4ec9a104c6007ae9c8b4691782a78506424f13015cba62ea4b56a905d577e295391b3d52c3e99147336721fa4dc77f58720f947e9f3c790003103333dbd36429885d4b106538b509233284bd201277aed7dbbf2800c5778cd9a2d28d3efea83ab1ba7570808a943f85f6590e5b7198cbb735a783c7d1fe0a90f10cb6d74990163f", 0xdf}], 0x7}}, {{&(0x7f0000000d00)=@nfc_llcp={0x27, 0x0, 0x0, 0x2, 0x6, 0x2, "9c52b86bca47d14fb4f326fc50b74de2cbfdba0b340ed1b40dc7ac769eaf3c4834b9f32a81c30bdcbc487922ac13befc68bb48745c34a8ceb83a1375af8d95", 0x1c}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000d80)="a49a6b0c568822ad9652bf4852a36ab0e5a62021524757ed77453d88d72fbdef1bbe321105559553515c5c3d400ab0d8cef19743e7d55ced704be03849aa7ad13d0ee4d88469afe39b74983000915eabc8d9ce4c91582f9845a85f9a89fdb2c50af250753852d4611b20a7164f9712eff050fb6ec7fa858b3f4d024664ef97ed", 0x80}, {&(0x7f0000000e00)="51a11c2c1530b864d7947ff79bd727eaeb7dc56f7a2773adf73fdd9f46b9a434125fd8be09c0572264946c33764bec38d78d8493cdb332d6496a403d49cde0de0d501e56dbf8eae7c0608f250c7bd3fc4609e2b98afbef9dd69f28d8940e367f864523dc30748e4c4c6b208e4fbd330d8edc20dc8c9c7e2481bdd5bede9625334d91f8f6c027b31d476096212fc56f7a54ad63ae348657c94ef3c6f0fcc3e181f72f4191f6749bdff83636e46c6a39d7b83e0209e7", 0xb5}, {&(0x7f0000000ec0)="054ee28c09f66986762e64aeb260f4563d8e942c65afb2125321e28ff4db2b57c53d8ae4af97d30979c6494b41abaa3a0ccc31ad2b9459bcf179ff534f4ae3d4102ed13e98f533a00e6f23b4e7768aa4ab4c396679839159f3a36506bd5d631f85d2e24777f349377e6a1c02e97a2b83e02a1bb0047041028022c4117313e489a622b57faa2523c7f7008d490b598dd5a8d6a83fe6837e9b547dd1a8eb1a7ee140cfbc01bdd73309a3cad0b4b7958ce1a98c777168ab4d8f2443205c17d540fac36e233da8056667d5d9df52f11fd301aeb5", 0xd2}], 0x3, &(0x7f0000000fc0)=[{0x108, 0x105, 0x7, "fbef961589472c1626c7367960683fbb669b03018d9d726290be3f63fb8421f55eebd5f37e5d8f174d95b5a7bd525c6d527ad4061da07fa5f71c1caabb32f771e347625f14d1001abe68db449026479b74a968a83bc955b8f45cc11d37c286e833123b8a20c8e9c76ac2460e52a4aba721141bdfa90d8a8c7688e4cc10243356c3ee56c60ba3886769de5d5348a131f5932017308d0f51c296c8d799b44891d9c50cdddce1bbf7c0b73bd2f6262c94bafad83d35a46ffb20918ff1851988595cd439986d96972439cf3d70a9e6d8a37f5676c0c757d8e5c21f8668394adc2a428321862cbd2b0de05feefd022a1c6ef8a5"}, {0x70, 0x119, 0x3, "6cac0624f51c6ceff204c7b91d7a96a79809439914b25c7fbc21041b285c2faaef035c58dc9106c3dc969bd4f2e8d6e11c936f136e41c90b64433c919da62ab591335ad180ef104f92e4b3c5b2f28814136ae2e615b944dd838e"}, {0x1010, 0x29, 0x8, "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"}, {0xa0, 0x114, 0x9, "d603b66c72035d15563792ed24ea28757b4bcdbda4f97f93e1b7efc9b762588b0de2d48a128be843a9ec40c222c4f7b0abf44944c8f55f1680c1c6c018df9c34d9983ecb5b953897b911650dd9653a7b1e9d79b946d24366777a17d90c3c6031a365c584ec8273dfaf975a5d3718a6f082fc05367d8ece57405f49303b3a6d62b3fb4270fb6c06b0e81d4ab43572ad"}, {0x60, 0x115, 0x0, "c1e8b91ca2ba29563a19a62438f80f6332c22869e311efc605a1c86692487c70b165b2579105a0091ea6ad171d3b567d5bf59801003611c5e23b15005785f13848271ec6953520727f"}, {0x20, 0x0, 0x3, "429f9e8f2bcf1b30a7a44751"}, {0x78, 0x10d, 0x6, "2dbe4b923ec6f83684c19d091590b29c79c2cb0607f4fd21c0633d3daa97113efc8758b9960138db8b83d0f64c829f6d26d9ebe32d7eba931f4a10a8adca18417625c82872d0936693e4f3ef50538125e0b5d7daf45ee769f93d3a61fc737af076ae8d3a92"}], 0x1320}}, {{0x0, 0x0, &(0x7f0000002640)=[{&(0x7f0000002a00)="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", 0x1000}, {&(0x7f0000002300)="ce805c1be6d0a29b0ebf35e0f3be6a0b2c1beda220ad71d5a16c30ffb7d2382a438eb077514ae7fc3d526092822a7360120489685a38e955f3c0ff319c769c6c5704e23c19f2e3f3f7fdfcb72c9db2745d848c4eef5ae6992249c652eeced5bfc042637cd9be41f99bb03e7330cb92f04089b4a960aef3a98f38fe210e7078d122c7991448ccb5516b3ba4106a0490d2141aee185785fbe11135a366d3dde0ac9d3a178306dce7c9bbe8bde370dff4bcbe3517e2cd03008dbaa08acfb035c134a86ecb7ca9a0314aac5ad20254e3ce9195bb99a5", 0xd4}, {&(0x7f0000002400)="1f6c066a55cfee35b15bba41ada319229a86875a6850f23638bc76843e8ec5002fa21f90052e2c2d911d5832d9dcf61c021f0b9f19155e071c6aca665ad12ebad97231c1ba927b560d4888c7312e0f2fd7078b7aa2c16f7987ce47157b4fcfac95bfc88e14f5670036bd4a4c6d9161c7fcf93c2905462a6a55fd2b3ac389a8c88e08eebe382e9c44114f551a34d72026ffe76f6bed9c0f5654af9b3663f6e121174a9812385ccf147b653f738c9d4d294b264f715abb5a497dc7a08595d0af00319ee2c60c7417397e", 0xc9}, {&(0x7f0000002500)="784860cde6548694daf0cfd1a65138e085a968b2886da187525078dc33530730c398e6b141c84fa4e30f1787534bd9175482ad3a2b2d6c6b9eecafcf820b7dd169bc4ad7271d1bae2d2d5214c2b3949da1a8b8a9752d8d7b97078f8bc660562906e39bbd95aaaea722194d8271bf038a4107be667f0a923389d8b74b6696c1cb015dde3c23682e4e26f2849db4e8d58a029cbd79ba65e34f21ad", 0x9a}, {&(0x7f00000025c0)="9733836893d295083d425b44aa3b4d5fe9fb60906f4f0e0340487afdd900ff38d6594721942b44d64d3ecfb1f699a8712c3cf83ae148f6c86b186f23bfd43999e25f1288aedede5f69aa2a9563", 0x4d}], 0x5}}, {{&(0x7f00000026c0)=@nfc_llcp={0x27, 0x0, 0x1, 0x3, 0x5, 0x9, "a9268b9602787f89d32ef9ef301ad883a8c68f92e9b4b4b944ea624d38ac15b71ee3681cbc08b090718c904079c771b35488e8aa1ae4ed602038fea566d17c", 0x1d}, 0x80, &(0x7f0000004b40)=[{&(0x7f0000002740)="5cc082820a0dfeb2fdca17a37e8f81655deb71ec76fb4b49fc7739f609e4287736357d5858da822adf8a8034e1390813d9dd94886da648e1222f668f3c27fea82ad2831e152836f96e29832e1bbf570042bf4c9f13e42f32c31b72112e93023828ce488971d7cd6ab81cd43c878c512e0ee0628f5be01d6a033cb4184f4e05b7080ef8612c4ca7f1faf36d274a1020fd53e5bb3092385b08e1f7db62585b749d28f8bf1ffd6306ed71cc5d392f8d839d59352bc7373badc4cdbd6d65475042aae6edd3c98fee38dbec1cac56a9fa2de15f9c077492ff1a3e2e2018ab9a6502ace54be57187335fce", 0xe8}, {&(0x7f0000002840)="4dde9ad8b78feb212c0d9e06af4aa079be0f216a9d882cddf0eddcfb6f153772de89bc9f7f6ef19b7352dcb44feadd50c10c3018ef07e43ec264522f9f502c3bd1dcbb25f1c7da198d6fdf2dcd04f7de02e21b64367f457b81373d29535ef49923da134f1bc4d9ffb17029ebe98d0ccb2be7c534858ebd56532f9eaa8f89ec2255adeb29ace6cff061d7f3498c6e435ddcfaee0b5b", 0x95}, {&(0x7f0000002900)="3a47a647b32bce3d11f78c726de55635eae6ca008fc685f60ae4c3ca86e1a30768260885f33b64606e34ed63b1df843c695a4ac3f0e8d15ccc883d90c4e6d33305c73774841d14de01918c278fe9b69ec96237606518e5578d9fa0c399f9cfbfc649cc98fd9e41a8c689", 0x6a}, {&(0x7f0000003a00)="5710e04841b75adfbd03ff5ad482b6e5dd10f8f384d4408959273f0171b2199938221f87177973fee795c0460c83accf9a47744439e16e9d049e9794ab6e7e509c1c9c5da6cc6feca701bdac5e6dfc9fb8388d6e16588a48b2f158ff3be1c1ca07fb1c1ffeba22c64cf41d88", 0x6c}, {&(0x7f0000003a80)="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", 0x1000}, {&(0x7f0000004a80)="15411eb980c9abc985c4fc0a9c4d764c71cfdefb564897e6897cc3cdfa512b2a8993a644ce0cf2b17b7333b84a2133632cdb1b3cd74493a02f7bd5930f852380bc6fb14cce50e839f0e317f308250b15145911161e6881b010861f91fc9b3d5b32931dfe08fa1d6b91fad91c76ff98df692a17c3a98ffc2466a9d8194ccc362b560e599e1c36b72fcd62c3065d5b106b0ac0a3faf5fd179375491a7aecb03e1b6bf9", 0xa2}], 0x6, &(0x7f0000004bc0)=[{0x110, 0x10a, 0x2, "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"}, {0xc0, 0x113, 0xe3c, "49c7cbee78c5cc4d0628cfc9968c341211ec116d14495e2de70cdc14ff25242bc3d9f6f6e2c9c26ae13fec97a15f7717e775764d14eb6639d8f63b29705820019862c102d2bc96d2b609e0534bcdf056e8541f9c59619026bce740f41ad844cfc220e0ee8cffaf635f1938f1ea969f7646b06aff7872fc5e71f53b0cc4bb17d03083fba428c595c193fb6e48599c04c1d4b242d78d54290b12d1714eecc080cbc9c58daaf7254efc7e86"}, {0xe8, 0x10e, 0x6c90, "15c1e1b5f13d1277f8c61bdbeba33cc0f447fb28888262da96d03271c9128a186bacbf1b8c9760d5e7eac77a459d44ec458f3130a1d53cc6fd9f4b889913a717a624338770e6f47bb84fa12c3f94d65f9159af8fea3ab3b021495fab58a3dd90f69525f32f40654d5edd223dc422a2fc4a1dc30ce162e92a881fea6200a26dbd5fdf56800dea79f20398b391b80d000d1577dd424157d29e53d2626affa3ed7882cc06531b860e50eaa223a8436bf3036837717c564d07c7ad46b66857ca024ad99b601473de80fe4ade3281877542f441"}, {0x1010, 0x118, 0x2, "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"}, {0x38, 0x10c, 0xe4, "a3938a9f878b58815d1e5245a147ffcf8adeb6f02cf53353eb53380c9f395d1d70c4"}, {0x90, 0x116, 0x6, "918ac3fd896f295af9e3030285efc9c714c7ad0a3d9ecb8da1edd035a34f2bc23b8c06162be4b613e8e48cdcb0ca63144a3b91079feb4f03f309fb41f1604d8d48dcdc8242527d3f661b43b371af99e6909366f942b965672aa1cfbff3f3e104e5a89b32d217ffeedbf1537c75805c2a69e739c878a75f1bee838bf9"}, {0x78, 0x10c, 0x400, "03a61bafb647a495aed61ee0898286c43612c1d0219612fc077b2d32a80960b6809d9566cd8f3667d455520e42f8a2d3d42e0480ba136203e77abf0ba4ea8107ab5ca17a4c5f3275f44891fd68b8add1c355cb5786f889f215ed07e96012c73be4b99cb1613687"}, {0xd0, 0x112, 0x80000000, "e85234a848647a00121bb7f72fe579c2f41cc118be50d527bb2d560a9cd8dcd4872e72ca6f11d530d1c263a036ac6bc13431676d0e61c216fe5d684292678a22fac80a051fe6e7be90f6bdf77dcb3f2d0aa935fc19b357c7b1284bfa2a817cde5ec6a735bc7ddcb5f5a1d82f1df3c10f19963c799997c086f477c8a05fe6deecbed16b09d36514e95a4c49fdf242696590ec73cb57aa86399c4f77b19fd715694f838f2649f549bd8c97bf13eca40650bd8fe6d1e3bd1181c7ae6e69"}, {0xe8, 0x115, 0x20, "2642c204d1e091ac064f97859df1cec78269e4019bade186bfd7480cbdb3e9f2cc911737ca521751fc2dc9adaf295bb3cf2039c0496b18f4493036f2a06ecc5828c986f444e89c2d74b78e8bc608bb22d7634c151a6f27bafa1aca9be8e0b9207a116409912556615f802f65708ae5f8d3644d0328c205ec1f5284ac0f566092a0dd14586f889bde0e4e0116a55944042f556d4e77b3549660542bb18ea47755502152a5f40e857f634d8f6f49832ae6f3946c66d00ac4f6b268c1ffb4259ed7b1d92edb884372ba9c893480530ff61c88459b4cf1fc3dab"}], 0x15c0}}, {{&(0x7f0000006180)=@llc={0x1a, 0x4, 0x6, 0x2, 0x7, 0x2c, @multicast}, 0x80, &(0x7f0000006400)=[{&(0x7f0000002980)}, {&(0x7f0000006200)="ebb78b584353dfad5d4543416b718056f7457c932f51cea2def3556c8a2767a9b0596ee0dbcb4b4d4c0442c9903d067bddba94d1c97c4f17db6ddc14e873923fc5b52a578e5cd880ef40e7007fc2d9679dc6f6c1da9b216c59c972ec1de8871a917340c7c6c7c2e554c07710a106594c", 0x70}, {&(0x7f0000006280)="71b78932be35cce6f0aee7570a227a5d92cf59e62c89e8e15eb64e56dabd923140af2018d228c7de45843042f6497b20", 0x30}, {&(0x7f00000062c0)="e64c9d34f17549b3216ce90164cb3383a72bef7ed1e20daed618fe801eb4fb", 0x1f}, {&(0x7f0000006300)="a2123ccbf9281ad6d061763b9c35191cc04313656d82a78e54663acd8713453c1917302948548bed54b46bfb3931c7e9f8399599", 0x34}, {&(0x7f0000006340)="33d9f3929251e4d8751b1aff9d8c5b7f2a098278114dbb1c7f0c43232fff3ddc892a5c5a65ee7c9acb94215dbafd769b33005bdfa87d2b43fded231aab1814cd2cc5d204515d613c63047f742cd2785a642282c6ac1f3dca42d2dd2fe300798eb4fbf82dcfe81d5d253e3a5a1ff36d7f0db78341084930acc38001a1fed0784f66", 0x81}], 0x6}}], 0x6, 0x48896) openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r2, &(0x7f00000029c0)={&(0x7f0000000280)=@pppol2tpv3in6, 0x80, &(0x7f0000003a00)}, 0x40002040) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x2e, &(0x7f0000000140)={&(0x7f0000000480)=@newlink={0x6c, 0x10, 0x401, 0x400000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x42df58543c8304db}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @xfrm={{0x9, 0x1, 'xfrm\x00'}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_XFRM_LINK={0x8, 0x1, 0x2}, @IFLA_XFRM_IF_ID={0x8, 0x2, 0x3}, @IFLA_XFRM_LINK={0x8, 0x1, 0x1}, @IFLA_XFRM_LINK={0x8, 0x1, 0x4}, @IFLA_XFRM_LINK={0x8, 0x1, 0x4}]}}}, @IFLA_CARRIER_CHANGES={0x8}, @IFLA_MASTER={0x8}]}, 0x6c}}, 0x4) 06:12:05 executing program 1: 06:12:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 418.976237] IPVS: ftp: loaded support on port[0] = 21 06:12:05 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) 06:12:05 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:05 executing program 1: 06:12:05 executing program 2: 06:12:05 executing program 4: 06:12:05 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) [ 419.309374] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 419.335902] 9pnet: Insufficient options for proto=fd 06:12:05 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:05 executing program 1: 06:12:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:06 executing program 4: 06:12:06 executing program 2: [ 419.557253] 9pnet: Insufficient options for proto=fd 06:12:06 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) 06:12:06 executing program 1: 06:12:06 executing program 4: 06:12:06 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:06 executing program 2: 06:12:06 executing program 1: 06:12:06 executing program 4: 06:12:06 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, r0, 0x0, 0x8) 06:12:06 executing program 2: [ 419.938894] 9pnet: Insufficient options for proto=fd [ 420.019678] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 06:12:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:06 executing program 4: 06:12:06 executing program 1: 06:12:06 executing program 2: 06:12:06 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:06 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) 06:12:06 executing program 2: 06:12:06 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) 06:12:06 executing program 1: 06:12:06 executing program 4: [ 420.275867] 9pnet: Insufficient options for proto=fd 06:12:06 executing program 2: 06:12:06 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 420.523710] 9pnet: Insufficient options for proto=fd [ 420.616504] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 06:12:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:07 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) 06:12:07 executing program 4: 06:12:07 executing program 1: 06:12:07 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:07 executing program 2: 06:12:07 executing program 2: [ 420.814134] 9pnet: Insufficient options for proto=fd 06:12:07 executing program 1: 06:12:07 executing program 4: 06:12:07 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:07 executing program 1: 06:12:07 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) [ 421.086493] 9pnet: Insufficient options for proto=fd [ 421.149563] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 06:12:07 executing program 2: 06:12:07 executing program 4: 06:12:07 executing program 1: 06:12:07 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f465", 0x33, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:07 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) 06:12:07 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000000200), 0x2) 06:12:07 executing program 2: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000080)=[{0x2, 0x6}, {0x3, 0xffff, 0x1000}, {0x3, 0x4}, {0x1, 0x8, 0x1000}, {0x0, 0x7, 0x1000}, {0x2, 0x20}, {0x1, 0xa9, 0x800}, {0x5, 0x200}, {0x0, 0x0, 0x1000}], 0x9) semop(r0, &(0x7f0000000180)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {0x3, 0x1, 0x1000}, {0x6, 0x50000000, 0x1800}, {0x1, 0x51, 0x1000}, {0x1, 0xde, 0x3a8c5a1af311d29d}], 0x6) 06:12:07 executing program 1: [ 421.352138] 9pnet: Insufficient options for proto=fd 06:12:07 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x8) 06:12:07 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:08 executing program 1: [ 421.612648] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 421.620076] 9pnet: Insufficient options for proto=fd 06:12:08 executing program 4: 06:12:08 executing program 1: 06:12:08 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:08 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 06:12:08 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/104, 0x68}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)=""/202, 0xca}, {0x0}], 0x2}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup(r4) recvfrom$unix(r5, &(0x7f0000000000)=""/16, 0x10, 0x0, 0x0, 0x0) shutdown(r3, 0x0) 06:12:08 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x1203, &(0x7f00000000c0), &(0x7f0000000380)=0x5) [ 421.841007] 9pnet: Insufficient options for proto=fd [ 422.131305] EXT4-fs (loop3): invalid first ino: 0 06:12:08 executing program 2: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000080)=[{0x2, 0x6}, {0x3, 0xffff, 0x1000}, {0x3, 0x4}, {0x1, 0x8, 0x1000}, {0x0, 0x7, 0x1000}, {0x2, 0x20}, {0x1, 0xa9, 0x800}, {0x5, 0x200}, {0x0, 0x0, 0x1000}], 0x9) semop(r0, &(0x7f0000000180)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {0x3, 0x1, 0x1000}, {0x6, 0x50000000, 0x1800}, {0x1, 0x51, 0x1000}, {0x1, 0xde, 0x3a8c5a1af311d29d}], 0x6) 06:12:08 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 06:12:08 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:08 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) r1 = dup(r0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x1203, &(0x7f0000000340), &(0x7f0000000380)=0x8) 06:12:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:08 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) [ 422.387322] 9pnet: Insufficient options for proto=fd 06:12:08 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001b80)=""/4088, 0xff8}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/85, 0x55}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfec5, 0x0, 0x0, 0x800e00505) shutdown(r3, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x4}, {r4, 0x2}], 0x2, 0x0, 0x0, 0x0) shutdown(r4, 0x0) [ 422.594489] 9pnet: Insufficient options for proto=fd 06:12:09 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 06:12:09 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080)={0x0, @in, 0x0, 0x0, 0x20e}, 0x98) [ 422.738896] EXT4-fs (loop3): invalid first ino: 0 [ 422.802419] 9pnet: Insufficient options for proto=fd 06:12:09 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) 06:12:09 executing program 2: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000080)=[{0x2, 0x6}, {0x3, 0xffff, 0x1000}, {0x3, 0x4}, {0x1, 0x8, 0x1000}, {0x0, 0x7, 0x1000}, {0x2, 0x20}, {0x1, 0xa9, 0x800}, {0x5, 0x200}, {0x0, 0x0, 0x1000}], 0x9) semop(r0, &(0x7f0000000180)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {0x3, 0x1, 0x1000}, {0x6, 0x50000000, 0x1800}, {0x1, 0x51, 0x1000}, {0x1, 0xde, 0x3a8c5a1af311d29d}], 0x6) 06:12:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:09 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x25, &(0x7f0000000100), &(0x7f0000000040)=0x7) 06:12:09 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) sendfile(0xffffffffffffffff, r0, 0x0, 0x8) [ 423.307153] 9pnet: Insufficient options for proto=fd 06:12:09 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8) 06:12:09 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 423.511573] 9pnet: Insufficient options for proto=fd 06:12:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/150, 0x96}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/4080, 0x1000}, {0x0, 0xfffffffffffffe60}, {0x0}], 0x3}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xffffff68, 0x0, 0x0, 0x800e0057d) shutdown(r2, 0x0) shutdown(r3, 0x0) 06:12:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/104, 0x68}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/17, 0x11}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x10000000000001a5) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0x896e, 0x0, 0x0, 0x800e00519) shutdown(r3, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r5, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/27, 0x1b}, {0x0}], 0x2) recvfrom$inet(r6, 0x0, 0xffffff8b, 0x0, 0x0, 0x800e00515) shutdown(r5, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r7, &(0x7f00000001c0)={0x10, 0x2}, 0x10) shutdown(r6, 0x0) shutdown(r4, 0x0) 06:12:10 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:10 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8) [ 423.670471] 9pnet: Insufficient options for proto=fd 06:12:10 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) utime(&(0x7f0000000300)='./file0\x00', 0x0) [ 423.747921] EXT4-fs (loop3): invalid first ino: 0 [ 423.842765] 9pnet: Insufficient options for proto=fd 06:12:10 executing program 2: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000080)=[{0x2, 0x6}, {0x3, 0xffff, 0x1000}, {0x3, 0x4}, {0x1, 0x8, 0x1000}, {0x0, 0x7, 0x1000}, {0x2, 0x20}, {0x1, 0xa9, 0x800}, {0x5, 0x200}, {0x0, 0x0, 0x1000}], 0x9) semop(r0, &(0x7f0000000180)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {0x3, 0x1, 0x1000}, {0x6, 0x50000000, 0x1800}, {0x1, 0x51, 0x1000}, {0x1, 0xde, 0x3a8c5a1af311d29d}], 0x6) 06:12:10 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8) 06:12:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:10 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:10 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x0) 06:12:10 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:10 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x0) 06:12:11 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000240)={0x0, @in, 0x0, 0x0, 0x6}, 0x98) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000180)=ANY=[@ANYBLOB="1c1c4e200000000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005fde2c0bc06ec96504875b6fc9"], 0x98) 06:12:11 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001b80)=""/4088, 0xff8}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/85, 0x55}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xd}, 0x42) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfec5, 0x0, 0x0, 0x800e00505) shutdown(r3, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x4}, {r4, 0x2}], 0x2, 0x0, 0x0, 0x0) shutdown(r4, 0x0) 06:12:11 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendfile(r3, r0, 0x0, 0x0) [ 424.540375] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 06:12:11 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:11 executing program 2: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000180)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {0x3, 0x1, 0x1000}, {0x6, 0x50000000, 0x1800}, {0x1, 0x51, 0x1000}, {0x1, 0xde, 0x3a8c5a1af311d29d}], 0x6) 06:12:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001b80)=""/4088, 0xff8}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/85, 0x55}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xd}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfec5, 0x0, 0x0, 0x800e00505) shutdown(r3, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x4}, {r4, 0x2}], 0x2, 0x0, 0x0, 0x0) shutdown(r4, 0x0) 06:12:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000001b00)=[{&(0x7f0000001b80)=""/4088, 0xff8}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x27c7, 0x0, 0x0, 0x800e0050e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000180)=""/85, 0x55}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0xb}, 0x0) r3 = dup(r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r4, 0x0, 0xfec5, 0x0, 0x0, 0x800e00505) shutdown(r3, 0x0) ppoll(&(0x7f0000000040)=[{r1, 0x4}, {r4, 0x2}], 0x2, 0x0, 0x0, 0x0) shutdown(r4, 0x0) 06:12:11 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:11 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:11 executing program 2: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000180)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {0x3, 0x1, 0x1000}, {0x6, 0x50000000, 0x1800}, {0x1, 0x51, 0x1000}, {0x1, 0xde, 0x3a8c5a1af311d29d}], 0x6) 06:12:11 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:11 executing program 2: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000180)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {0x3, 0x1, 0x1000}, {0x6, 0x50000000, 0x1800}, {0x1, 0x51, 0x1000}, {0x1, 0xde, 0x3a8c5a1af311d29d}], 0x6) [ 425.436613] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 06:12:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x2, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_VFINFO_LIST={0x14, 0x16, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@IFLA_VF_LINK_STATE={0xc}]}]}]}, 0x34}}, 0x0) [ 425.519631] 9pnet: Could not find request transport: fd0x0000000000000003 06:12:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:12 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:12 executing program 2: semop(0x0, &(0x7f0000000080)=[{0x2, 0x6}, {0x3, 0xffff, 0x1000}, {0x3, 0x4}, {0x1, 0x8, 0x1000}, {0x0, 0x7, 0x1000}, {0x2, 0x20}, {0x1, 0xa9, 0x800}, {0x5, 0x200}, {0x0, 0x0, 0x1000}], 0x9) semop(0x0, &(0x7f0000000180)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {0x3, 0x1, 0x1000}, {0x6, 0x50000000, 0x1800}, {0x1, 0x51, 0x1000}, {0x1, 0xde, 0x3a8c5a1af311d29d}], 0x6) 06:12:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x80005) syz_emit_ethernet(0x26, &(0x7f00000000c0)={@local, @random="f0485c31bacf", @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x88, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x7, 0x4, 0x0, 0x3}]}}}}}}, 0x0) [ 425.787493] 9pnet: Could not find request transport: fd0x0000000000000003 [ 425.952193] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) 06:12:12 executing program 1: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000140)='./file0\x00', 0x0, 0x7a80, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_all\x00', 0x275a, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x17) fallocate(r1, 0x0, 0x0, 0x810fffb) 06:12:12 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x3) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCFLSH(r1, 0x80047437, 0x0) 06:12:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:12 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() r1 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00007a8000)) 06:12:12 executing program 4: open(0x0, 0x0, 0x1a9) chdir(0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xbe, &(0x7f0000000280)={@link_local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @broadcast=0xe0000001}, {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "6f59ba5f4a67033ddeb6c19bd92b7168378e0fdf6f477fac11a1e745edc17c32", "a967527858e47f4e0c92629775a3cca55301abe491296a1509010020ced8af8be413ceb4553174d4780e817ba7310ac2", "f731a1d9f9be474794588eab658fbe595c2a1610ece33d214735aabf", {"77cc5a1ad9a9e1a43213f907bfebcead", "91116aee49b88ae55224fdfb93da9426"}}}}}}}, 0x0) [ 426.080844] 9pnet: Could not find request transport: fd0x0000000000000003 06:12:12 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:12 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="0040000068020000973d00001200000000000000843d00000004000073564d38840300001e000000000000000010cc03020001005265497345723346730000000200000002", 0x45, 0x10000}, {&(0x7f0000000040)="0000020000000000000000001200000000000000843d00000004000073564d388403", 0x22, 0x3d96000}, {&(0x7f0000011300)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f", 0x46, 0x3d97000}, {&(0x7f0000011400)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x3d97fa0}], 0x1, &(0x7f0000000380)=ANY=[]) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1a20a1, &(0x7f0000001500)=ANY=[@ANYBLOB='n']) 06:12:12 executing program 1: syz_mount_image$afs(&(0x7f0000000000)='afs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="736f757263653d25065d245b2b2e5d28257b3a"]) 06:12:12 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) [ 426.244228] 9pnet: Insufficient options for proto=fd [ 426.247651] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 426.271864] REISERFS (device loop0): found reiserfs format "3.5" with non-standard journal [ 426.283275] REISERFS (device loop0): using ordered data mode [ 426.291315] reiserfs: using flush barriers [ 426.336361] REISERFS (device loop0): journal params: device loop0, size 15748, journal first block 18, max trans len 1024, max batch 900, max commit age 0, max trans age 30 [ 426.382125] REISERFS (device loop0): checking transaction log (loop0) [ 426.393495] REISERFS (device loop0): Using rupasov hash to sort names [ 426.401999] REISERFS (device loop0): using 3.5.x disk format 06:12:13 executing program 2: semop(0x0, 0x0, 0x0) semop(0x0, &(0x7f0000000180)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {0x3, 0x1, 0x1000}, {0x6, 0x50000000, 0x1800}, {0x1, 0x51, 0x1000}, {0x1, 0xde, 0x3a8c5a1af311d29d}], 0x6) 06:12:13 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:13 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x80005) open(0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) exit(0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x0) open(0x0, 0x0, 0x0) 06:12:13 executing program 0: r0 = memfd_create(0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x42e, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) 06:12:13 executing program 4: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) chdir(&(0x7f0000000440)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000200)="2e6afc15a4e11d85204bbac0fab3ad22b02f7a7d6063204b732f50ceebe1915925d19223eb341363059f0d6b963a075f12d570f1597acc092495657b84e7514a6d5ffef06dee801bf213b873da5636777f13f07e7fcab60f2c1833ad9e11dfdfed283dc5776d967f92a1651af64c6fa18c7e571b2ca11e3af998027219f798358d8b29ef3cf6828dd7ea544800c0b4760711bc9b2965a6ff14df1dbe0f4f304399edb5e321b95b1272cbb0e768c1a5fb2a2ee188d535eb24aac4a88de3ec637b4ddefbc66d0ce07a83a9e6cbe0f73c275df820989e09b3daff1860db03b243d0fca0b8c30eef67018be80a38a6d19d5e1056ef4e56a3", 0xffffff29}]) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) 06:12:13 executing program 2: semop(0x0, 0x0, 0x0) semop(0x0, &(0x7f0000000180)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {0x3, 0x1, 0x1000}, {0x6, 0x50000000, 0x1800}, {0x1, 0x51, 0x1000}, {0x1, 0xde, 0x3a8c5a1af311d29d}], 0x6) 06:12:13 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfd', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000320000000f000000000000000200000002000000008000000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000032000f", 0xf, 0x1000}, {&(0x7f0000010400)="ff3f000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000000040)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040008", 0x1d, 0x4100}], 0x0, &(0x7f0000013800)) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) pwritev(r0, &(0x7f00000014c0)=[{&(0x7f00000000c0)="d6", 0x1}], 0x1, 0x0, 0x0) 06:12:13 executing program 0: syz_mount_image$romfs(&(0x7f0000000000)='romfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000340)=[{&(0x7f0000010000)='-rom', 0x4}, {&(0x7f0000010100)="0000052a000000000000041a69968a5766696c6530000000000000000000000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a", 0x320, 0xe0}, {&(0x7f0000000040)="c1", 0x1, 0x6}], 0x0, &(0x7f0000010a00)) 06:12:13 executing program 2: semop(0x0, 0x0, 0x0) semop(0x0, &(0x7f0000000180)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {0x3, 0x1, 0x1000}, {0x6, 0x50000000, 0x1800}, {0x1, 0x51, 0x1000}, {0x1, 0xde, 0x3a8c5a1af311d29d}], 0x6) 06:12:13 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:13 executing program 2: semop(0x0, &(0x7f0000000080)=[{0x2, 0x6}, {0x3, 0xffff, 0x1000}, {0x3, 0x4}, {0x1, 0x8, 0x1000}, {0x0, 0x7, 0x1000}, {0x2, 0x20}, {0x1, 0xa9, 0x800}, {0x5, 0x200}], 0x8) semop(0x0, &(0x7f0000000180)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {0x3, 0x1, 0x1000}, {0x6, 0x50000000, 0x1800}, {0x1, 0x51, 0x1000}, {0x1, 0xde, 0x3a8c5a1af311d29d}], 0x6) [ 426.897609] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 426.919442] 9pnet: Insufficient options for proto=fd [ 427.010130] MTD: Attempt to mount non-MTD device "/dev/loop0" 06:12:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) 06:12:13 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="0040000068020000973d00001200000000000000843d00000004000073564d38840300001e000000000000000010cc03020001005265497345723346730000000200000002", 0x45, 0x10000}, {&(0x7f0000000040)="0000020000000000000000001200000000000000843d00000004000073564d388403", 0x22, 0x3d96000}, {&(0x7f0000011300)="010002005c0f0000000000000000000000000000000000000100000002000000000000000000000000002c00d40f0100010000000200000001000000f401000002003000a40f", 0x46, 0x3d97000}, {&(0x7f0000011400)="0000000001000000010000000200000028000400020000000000000001000000200004002e2e0000000000002e00000000000000ed41000003", 0x39, 0x3d97fa0}], 0x1, &(0x7f0000000380)=ANY=[]) syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) getuid() r0 = syz_mount_image$cramfs(&(0x7f0000000540)='cramfs\x00', &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x240038, &(0x7f0000001ec0)=ANY=[]) fchown(r0, 0xee00, 0x0) [ 427.053261] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 427.068429] romfs: VFS: Can't find a romfs filesystem on dev loop0. [ 427.090618] 9pnet: Insufficient options for proto=fd [ 427.196858] MTD: Attempt to mount non-MTD device "/dev/loop0" [ 427.228870] romfs: VFS: Can't find a romfs filesystem on dev loop0. [ 427.259985] REISERFS (device loop4): found reiserfs format "3.5" with non-standard journal [ 427.276728] REISERFS (device loop4): using ordered data mode [ 427.283496] EXT4-fs (loop3): fragment/cluster size (65536) != block size (4096) [ 427.286378] reiserfs: using flush barriers [ 427.349445] REISERFS (device loop4): journal params: device loop4, size 15748, journal first block 18, max trans len 1024, max batch 900, max commit age 0, max trans age 30 [ 427.376141] REISERFS (device loop4): checking transaction log (loop4) [ 427.384435] REISERFS (device loop4): Using rupasov hash to sort names [ 427.395266] REISERFS (device loop4): using 3.5.x disk format [ 427.421729] reiserfs: enabling write barrier flush mode [ 427.441558] ------------[ cut here ]------------ [ 427.447274] WARNING: CPU: 0 PID: 25672 at fs/inode.c:979 unlock_new_inode.cold+0x11/0x3f [ 427.455533] Kernel panic - not syncing: panic_on_warn set ... [ 427.455533] [ 427.463099] CPU: 0 PID: 25672 Comm: syz-executor.4 Not tainted 4.19.147-syzkaller #0 [ 427.471601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.480976] Call Trace: [ 427.483730] dump_stack+0x22c/0x33e [ 427.487471] panic+0x2ac/0x565 [ 427.490696] ? __warn_printk+0xf3/0xf3 [ 427.494607] ? unlock_new_inode.cold+0x11/0x3f [ 427.499278] ? __probe_kernel_read+0x130/0x1b0 [ 427.503889] ? __warn.cold+0x5/0x5a [ 427.507545] ? unlock_new_inode.cold+0x11/0x3f [ 427.512240] __warn.cold+0x20/0x5a [ 427.515803] ? unlock_new_inode.cold+0x11/0x3f [ 427.520420] report_bug+0x262/0x2b0 [ 427.524161] do_error_trap+0x1e1/0x330 [ 427.528102] ? math_error+0x320/0x320 [ 427.531976] ? __irq_work_queue_local+0x155/0x200 [ 427.536933] ? irq_work_queue+0x29/0x80 [ 427.540985] ? wake_up_klogd+0xef/0x140 [ 427.544980] ? vprintk_emit+0x1d0/0x7c0 [ 427.549057] ? trace_hardirqs_off_caller+0x69/0x210 [ 427.554156] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.559088] invalid_op+0x14/0x20 [ 427.562564] RIP: 0010:unlock_new_inode.cold+0x11/0x3f [ 427.567942] Code: ee e8 31 ee b4 ff 48 c7 c7 80 0e 16 88 e8 54 69 9e ff 0f 0b e9 a7 76 ff ff e8 19 ee b4 ff 48 c7 c7 80 0e 16 88 e8 3c 69 9e ff <0f> 0b b8 ff ff 37 00 4c 89 e2 48 c1 ea 03 48 c1 e0 2a 80 3c 02 00 [ 427.586946] RSP: 0018:ffff888087aef670 EFLAGS: 00010286 [ 427.592409] RAX: 0000000000000024 RBX: ffff88804e48d1e8 RCX: 0000000000000000 [ 427.599693] RDX: 0000000000027298 RSI: ffffffff815b523f RDI: ffffed1010f5dec0 [ 427.606982] RBP: 0000000000000000 R08: 0000000000000024 R09: 0000000000000000 [ 427.615921] R10: 0000000000000005 R11: 0000000000000000 R12: ffff88804e48d2b8 [ 427.623211] R13: ffff88804e48d270 R14: 0000000000000000 R15: 00000000fffffff4 [ 427.630587] ? vprintk_func+0x7f/0x224 [ 427.634595] reiserfs_new_inode+0x3b8/0x2150 [ 427.639117] ? find_held_lock+0x58/0x110 [ 427.643210] ? reiserfs_fh_to_parent+0x1b0/0x1b0 [ 427.647997] ? ww_mutex_unlock+0x2f0/0x2f0 [ 427.652401] ? do_journal_begin_r+0x298/0x10d0 [ 427.657014] ? ww_mutex_unlock+0x2f0/0x2f0 [ 427.661272] ? __mutex_unlock_slowpath+0xea/0x660 [ 427.666156] ? __mutex_add_waiter+0x160/0x160 [ 427.670669] ? __mutex_add_waiter+0x160/0x160 [ 427.675200] ? do_journal_begin_r+0xd24/0x10d0 [ 427.679905] ? security_old_inode_init_security+0xf4/0x130 [ 427.685565] reiserfs_mkdir+0x4ad/0x980 [ 427.689569] ? reiserfs_mknod+0x700/0x700 [ 427.693742] ? ww_mutex_unlock+0x2f0/0x2f0 [ 427.698017] reiserfs_xattr_init+0x406/0xae0 [ 427.702506] reiserfs_remount+0x103c/0x1640 [ 427.706844] ? finish_unfinished.isra.0+0x13a0/0x13a0 [ 427.712062] ? mark_held_locks+0xf0/0xf0 [ 427.716255] ? find_next_bit+0x105/0x130 [ 427.721530] ? selinux_inode_copy_up+0x180/0x180 [ 427.726435] ? selinux_mount+0x21c/0x360 [ 427.730607] do_remount_sb+0x1a0/0x6a0 [ 427.734535] ? finish_unfinished.isra.0+0x13a0/0x13a0 [ 427.739747] ? user_get_super+0x1f0/0x1f0 [ 427.743914] ? security_capable+0x8f/0xc0 [ 427.748154] do_mount+0x1854/0x2f10 [ 427.751860] ? check_preemption_disabled+0x41/0x2b0 [ 427.756934] ? copy_mount_string+0x40/0x40 [ 427.761340] ? kmem_cache_alloc_trace+0x379/0x4b0 [ 427.766207] ? _copy_from_user+0xd2/0x130 06:12:14 executing program 1: r0 = syz_mount_image$tmpfs(&(0x7f0000000400)='tmpfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[]) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) fallocate(r0, 0x43, 0x0, 0x8) 06:12:14 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) utime(&(0x7f0000000300)='./file0\x00', 0x0) 06:12:14 executing program 2: semop(0x0, &(0x7f0000000080)=[{0x2, 0x6}, {0x3, 0xffff, 0x1000}, {0x3, 0x4}, {0x1, 0x8, 0x1000}, {0x0, 0x7, 0x1000}, {0x2, 0x20}, {0x1, 0xa9, 0x800}, {0x5, 0x200}], 0x8) semop(0x0, &(0x7f0000000180)=[{0x3, 0x0, 0x800}, {0x0, 0x3, 0x1800}, {0x3, 0x1, 0x1000}, {0x6, 0x50000000, 0x1800}, {0x1, 0x51, 0x1000}, {0x1, 0xde, 0x3a8c5a1af311d29d}], 0x6) 06:12:14 executing program 0: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='norecovery,localflocks,statfs_quantum=0x00000000ffffffff']) 06:12:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040", 0x3d, 0x4c00}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a0900000000", 0x13, 0x40000}, {0x0}], 0x0, &(0x7f0000014a00)=ANY=[]) setgid(0x0) syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x1000041, 0x0) open$dir(0x0, 0x16d900, 0x172) keyctl$update(0x2, 0x0, &(0x7f0000000180)="21abf5976e277ca2409d35d999454f82261da65ead03154d63f76fb4599814ec948621fcc5d5549b9672e7c28121d9b101dcb5c9737a4ac942e35b708c42bcd5121dbd680dd53d99801a2303dd8dc0e8ce17dd72f83e25603d0e15c6947672e8e2e203d76f111d0f5d260f0917004ea2476b", 0x72) [ 427.770689] ? copy_mount_options+0x261/0x370 [ 427.775207] ksys_mount+0xcf/0x130 [ 427.778757] __x64_sys_mount+0xba/0x150 [ 427.782761] ? lockdep_hardirqs_on+0x3c1/0x5e0 [ 427.787369] do_syscall_64+0xf9/0x670 [ 427.791230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.796449] RIP: 0033:0x460bca [ 427.799653] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 87 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 87 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 427.809154] 9pnet: Insufficient options for proto=fd [ 427.818692] RSP: 002b:00007f6def368a88 EFLAGS: 00000212 ORIG_RAX: 00000000000000a5 [ 427.818866] RAX: ffffffffffffffda RBX: 00007f6def368b20 RCX: 0000000000460bca [ 427.818875] RDX: 0000000020000540 RSI: 0000000020000580 RDI: 0000000000000000 [ 427.818885] RBP: 00007f6def368ae0 R08: 00007f6def368b20 R09: 0000000020000540 [ 427.818894] R10: 0000000000240038 R11: 0000000000000212 R12: 0000000020000540 [ 427.818901] R13: 0000000020000580 R14: 0000000000000000 R15: 0000000020001ec0 [ 427.825871] Kernel Offset: disabled [ 427.874058] Rebooting in 86400 seconds..