0x4280) 03:35:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0a7e254f5773f8d20000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000500000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:02 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x80000001, 0xa000) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000040)={0x1ff, 0x4770, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) open$dir(&(0x7f0000000080)='./file0\x00', 0x1dc889b996679fbf, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000000c0)=0x4, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x80) shmctl$SHM_LOCK(0x0, 0xf) write$FUSE_LSEEK(r0, &(0x7f0000000100)={0x18, 0x0, 0x2, {0x2}}, 0x18) 03:35:02 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)="2f6465762f736e642f736571ff", 0x0, 0x4280) 03:35:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2, 0x0) sendmsg$nfc_llcp(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x27, 0x0, 0x0, 0x7, 0xfffffffffffffffb, 0x10000, "7ae7bcd1deeb70d288a4b2b1dd25220829b7cef5b54d116aea3d98438d99aaa7e1b13d06a3677745246db380a6839679cce1b400fa6981ec51a275fd4a0a23", 0x20}, 0x60, &(0x7f00000001c0)=[{&(0x7f0000000140)}, {&(0x7f0000000180)}], 0x2, &(0x7f00000002c0)=ANY=[@ANYBLOB="0001000000000500190100000900000002a02ce2bbc81302645fddaeb2692ac4a1acf86011b3fa0f1724d00653a8da69aa7e408eedeabc289e9d468e4f1de36503ec4e02a557f27c4c4210c9dfe6f6bd3040c1f75224cb60336e1c718129c9f7b147efc1d7e4009180066a3d8b1587a26e4f6dfb9f3bd2767c886a1a7aee166ff288c5db42b96defdcd0da0872ed8ca550174bcb6d501d2b48e74b239ea328e714bde3895fa0ace3a20508d1853bffa062ce6df80aa6693824f5931ffa24017e5534615082f3bf5aba98384bacd2e85988af7b8e40b47ae6d998579603a85167cb0e9f63f8511f405d6ee10f49e73a3e2c35213fe8ccc8000000000000000000"], 0x100, 0x4}, 0x4000) [ 775.612237] EXT4-fs (sda1): re-mounted. Opts: 03:35:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x100000001, 0x1) timer_create(0x0, &(0x7f0000000000)={0x0, 0x6, 0x3, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_delete(r2) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0x4, 0x0, 0x99, 0x800, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r3, 0xfc}, &(0x7f0000000180)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$SHM_LOCK(0x0, 0xf) 03:35:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000005e1c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000fff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:02 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x5, 0x4280) 03:35:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1954eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x3f}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r2, 0x8}, 0x8) [ 775.809226] EXT4-fs (sda1): re-mounted. Opts: 03:35:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="7a00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:03 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x20000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0xf2, 0x6, 0x1000000000000, 0x101}, 0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) shmctl$SHM_LOCK(0x0, 0xf) 03:35:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000000)=ANY=[@ANYRES16], 0x1}}, 0x0) 03:35:03 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x4000000, 0x4280) [ 775.995443] print_req_error: I/O error, dev loop4, sector 128 03:35:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x90000, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000040)={'bond_slave_1\x00', 0x7fff}) shmctl$SHM_LOCK(0x0, 0xf) 03:35:03 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0xbf00, 0x4280) 03:35:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYRESOCT=r0], 0x1}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) 03:35:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000006c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 776.143971] EXT4-fs (sda1): re-mounted. Opts: 03:35:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00001c5ee539c37d1f23004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 776.239946] EXT4-fs (sda1): re-mounted. Opts: 03:35:03 executing program 1: r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x80000) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x1, 0x0) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000300)={0x5, 0x4c17, 0xffff, 0x4}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/67, &(0x7f0000000140)=0x43) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x40000, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000400)) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000240)={0xab2e, 0x3, 0x525ac7db, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'vlan0\x00'}) shmctl$SHM_LOCK(0x0, 0xf) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) getsockopt$netlink(r1, 0x10e, 0x5, &(0x7f0000000440)=""/75, &(0x7f0000000380)=0xfffffffffffffdcd) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000200)=0xc6, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000003c0)={0x4, &(0x7f0000000280)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}]}) 03:35:03 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x1000000000000, 0x4280) 03:35:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) clone(0x800000, &(0x7f0000000000)="ba", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="cdb1d0d42976b808c758bcc769b991007f13b82c0abeb9988758605d3634150fa5a7033740c17c51dcb50d57b9b8ab666769bae6dc3b3041355d2b4ad6a226f84b9a288bf16427d1b3afbd0909a3076bb6428743d51b7fed42bf95814eb8c798e327a264ba287c80c336214ce369dd866af3c1410d5254f38b4062fd9d82") r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000280)=""/15, 0xf) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000200)={0x401, 0xffffffffffff0001}) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f0000000300)={0xff, {{0xa, 0x4e20, 0x20000000, @loopback, 0x8}}, {{0xa, 0x4e20, 0xffffffff, @ipv4, 0xa0}}}, 0x108) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000240)={0x0, 0x0, 0xa45a}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f00000002c0)={r2, 0x38ebdb983a6a65cc, r1}) sendmsg$nl_generic(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000440)=ANY=[@ANYBLOB="1800000004000000000000050000030000009d617570af1956eb7407a900135a611e5c35dd438fdd0100017be900000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$SHM_LOCK(0x0, 0xf) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/7, &(0x7f0000000080)=0x7) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000)=0x4, 0x1) 03:35:03 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x4c000000, 0x4280) 03:35:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00007fffffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a4c000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0005000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:03 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x8001a0, 0x4280) 03:35:03 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x50000, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000003c0)={0x31, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}}}, 0x88) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x2000) setsockopt$inet_group_source_req(r1, 0x0, 0x0, &(0x7f0000000140)={0x40, {{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) 03:35:03 executing program 1: socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x50f39b29, 0x400040) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) sync_file_range(r0, 0x2, 0x0, 0x1) signalfd(r1, &(0x7f0000000140)={0x39}, 0x8) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000300)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) r5 = request_key(&(0x7f0000000400)='id_resolver\x00', &(0x7f0000000440)={'syz', 0x3}, &(0x7f0000000480)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffff8) keyctl$get_persistent(0x16, r4, r5) ioctl$DRM_IOCTL_AGP_INFO(r2, 0x80386433, &(0x7f0000000200)=""/253) shmctl$SHM_LOCK(0x0, 0xf) 03:35:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000030000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:04 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$KDDELIO(r0, 0x4b35, 0x3) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000002300000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:04 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x74000000, 0x4280) 03:35:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="e000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:04 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) shutdown(r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000180)=0x1, 0x4) sendto$inet(r0, &(0x7f0000000480)='\x00', 0x1, 0x0, &(0x7f0000000040)={0x2, 0x0, @rand_addr}, 0x10) recvmsg(r0, &(0x7f0000000400)={&(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000640)=""/4096, 0x1000}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x142) 03:35:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000004c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x5, 0x200002) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x10001}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000140)={r2, @in={{0x2, 0x4e24, @local}}, [0x0, 0x87d, 0x3, 0x7fffffff, 0x400, 0x7, 0x1296, 0x6, 0x7, 0x517, 0xe9a, 0x8, 0x2, 0x9, 0x3f]}, &(0x7f0000000240)=0x100) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000340)=ANY=[@ANYBLOB="180000d3002e00ffff000200fdff3f0000030000009d617570af1956eb7407a90000000000000096d8e1dbc2350a83cbb2b6895ca1b14eef1dbc618e4fb2ab1cff05cca4147058a60d0bbd5b2905000000000000006e06cf59f20d3706149d26977ca5fec0e34406e973eb0ecbe3af714c269b9d2ed26031d38cb5492e6da6ca9748984ca02a85ad30aea495810c0b5090e92867fa895873bd7df073248cd29209ca13"], 0x1}}, 0x0) 03:35:04 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0xbf000000, 0x4280) 03:35:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000940)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000340), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x200, 0x0, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:35:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000005e1c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180000002e00ff080000000000000000030000009d610770af1956eb7407a90000000000000080d8e1dbc2221691c4fe67b4f7c752b5f055de52d821dbf8798cad0c00f71a09a1d59324edd007db0dc931a0848cd1c1617eeb2b0dd6f302df0ec2d247b1b631f7c4a821c414fbea016e98a50b45d5a75dd7781896de37ed482ecdf5bf310f90f14770f22f77c36b7a0692b56170dc9f5c5f1a011c534214bc1e1d5cf91971eed9495a32baa6e8a8b2f06fae3ecbd4b92e2a06c0f1d77cdea4fa708115"], 0x1}}, 0x0) r1 = socket(0x4, 0x8080f, 0x6) r2 = fcntl$getown(r0, 0x9) fstat(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() fcntl$getownex(r0, 0x10, &(0x7f0000001bc0)={0x0, 0x0}) stat(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000001cc0)=0x0, &(0x7f0000001d00), &(0x7f0000001d40)) r8 = getpgid(0xffffffffffffffff) getresuid(&(0x7f0000001d80), &(0x7f0000001dc0), &(0x7f0000001e00)=0x0) getgroups(0x4, &(0x7f0000001e40)=[r7, 0xee00, r4, 0xee00]) r11 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e80)={{{@in6=@local, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000001f80)=0xe8) stat(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000002080)=0x0) r15 = getuid() r16 = getegid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000020c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002100)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000002200)=0xe8) getgroups(0x1, &(0x7f0000002240)=[0x0]) r20 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002280)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002380)=0xe8) r22 = getegid() r23 = getpgid(0xffffffffffffffff) lstat(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000002480), &(0x7f00000024c0), &(0x7f0000002500)=0x0) r26 = getpgid(0xffffffffffffffff) lstat(&(0x7f0000003d80)='./file0\x00', &(0x7f0000003dc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003e40)={0x0, 0x0, 0x0}, &(0x7f0000003e80)=0xc) r29 = getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003ec0)={{{@in=@rand_addr, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000003fc0)=0xe8) r31 = getgid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000005480)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000054c0)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000055c0)=0xe8) stat(&(0x7f0000005600)='./file0\x00', &(0x7f0000005640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000005700)=[{&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000014c0)=[{&(0x7f0000000240)="f460c9f702f8b8ccfdd899847840db28523e71b9cb2597b39b3e5e03c93be70320a0554c783ed628966eb42e17496cc20323fb8fd0972cfe98f8c84bc7a86a557aca8f180cd6f7033fb40535361f6bd5fdd15ff50f3d005ea487c5e0a85e40605d842688e1738cfbef68ff8673052bcd35dcee0a6828cbe2f40add81", 0x7c}, {&(0x7f00000002c0)="992364ea1cbc0f6d30dc9c097c3267f03104a1031d43789fff87c7cc42bdff2e2169ab472fed8c2442b7753ceb3c2b88b9e60c6a82d2be8fba1d43224f7c72f98cf0bc174799f6a20e2c10cd1a87644b290c8c96eced374a087c3f7159595189859727f40a8d0ec5f8d64210e8508cf023724b6c6421", 0x76}, {&(0x7f0000000340)="16f2008db0ad314574508f38ebf25bbd6b1f66330bbd84eb4f80161226709e83634570e57656ee786190b25c45385a2b478312ff2d4fe918b1c435d659848e6612bed6aeb76fbd2a3ff496201ca32935c8abc39cddad665c086dfd02295c74fd59b9e9a81170", 0x66}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="0cc6c9fbeb38c4d50dea7eddac64b53a90884d039fe008ea78b6650a2d574ba444ade3e535c469945980204256ecb3772b7825a9c44a3a13e490f30be1ae0880deca0018a2a24a0bca975804f1ee0ba7e141c298cab8c026edfb501d562e0c78b762053053c1028511c0a11fb7491e71329d565f88addb35ad8620b3909778aeb8114d1ad407239b227c472ec249869359f42cc2d49f0bbfb983fbf360725c4bb1fbcc0f69a8171e6d1916570bd468be0146e57d34e515aec152d1d0b8608a11035ebd2887", 0xc5}], 0x5, 0x0, 0x0, 0x40000}, {&(0x7f0000001540)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001780)=[{&(0x7f00000015c0)="a1d605d89c20c227145238594c1c19ebd8f2e9bd8ca5f5be8c07173b534878f1dc369cd60e030c055c12042145a6f97305d9777b363f6b3086885a4b51471964b692a827eca6f5c55dc44751ac766ca1953b50c867b9480d5db131711144ae3ca8630904e7a90bd00901c276b018ca457869d39da83352f52b3a92b610173ffe50027dd0d848d061425d4c1a2e52f8a42485976533822a1110cefa1bdb80bce163315761bdac6d39830a5aeb0da62f016e374831fa5d177108797c287ae981b1f7de12614b3c1cd50213f30e836debf748282b064d9193625de27dcd84e5549b79f56a", 0xe3}, {&(0x7f0000000000)="6105802d3f98afe43c85c3a1a4da8cf3f5602076debb57c8040d85daab03e3a33ce9510df4f32d12fc9ed2a78e504e762f4f9e", 0x33}, {&(0x7f00000016c0)="f58e4793de3770c30dff15785df2647aa1f5a0c2da1149acc6c7482c5d4e11c3f1ba654a5da3503b0c48749ef81d724cfc36c2455fc438646e14c54162724f8977a171b15f5418886ee37cc1c347747d7e6efc0c59577992c1a099173a89931125cd6b90523e33ce89e1f8270215b96f6274cc7a8ed950806fb950bad9f9c35648869d9de9d1697d9af8ecbe6b91ee3c72c734330cdc57002508e7811d14", 0x9e}], 0x3, &(0x7f0000001840)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}], 0x40}, {&(0x7f0000001880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001b40)=[{&(0x7f0000001900)="9c84ce04c6cd164bca1c710f96b2064ef228465dea3dd4eebfaf931791839cbe0d7da04f986779076dd882aefca3d508e8539f6e4750ce739eb9f78d4dbdb8d050a9caf60595241deef8f315c439b0c435320280b2c539ce7234a9674e530cb8c1ec41b1214ccfa454c79807f5f0d6e9019cb119631c659dd584313cd9939acb9ba6908c", 0x84}, {&(0x7f00000019c0)="11a52d64a209c8da83c7c5f75fd942f62e8795cea5f5293eabd9b81f407069cab9690ef4117eb05d600ab77cd9820c37003d26647eae7f214a70ccb42732d83a9ad136e3064a6f9d02", 0x49}, {&(0x7f0000001a40)="03dc9616e03eaa31d9f183df8bae7e97012719b3d7df942592d35ece56e1985a", 0x20}, {&(0x7f0000001a80)="100979f3fd653fa00f1892635d569dea461061df8420a4e66f395f1d41b067f8257808778aaa93a10df15b", 0x2b}, {&(0x7f0000001ac0)="cc228605e91dc6051f0affc438f6ff51467679db52aaf457b00f96e38c553e97b66f7bd5c0304c5aeb303a855436fe6570faffb8e02259f895f1794973196f87435369145b662a0a", 0x48}], 0x5, &(0x7f0000002540)=[@cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @cred={0x20, 0x1, 0x2, r20, r21, r22}, @cred={0x20, 0x1, 0x2, r23, r24, r25}], 0x120, 0x20044081}, {&(0x7f0000002680)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003cc0)=[{&(0x7f0000002700)="c3ee7dbb8d25833f45b0d989b5af0365ab0aa600242e0ccc1db782dfa0ba7e486fe3d8013e9364dbe3", 0x29}, {&(0x7f0000002740)="b98f9f030512b90716b0bf6288273d187e73b8fed79eb62d4e0ffcfcefde453fb66db80ecd5eb97783e18523460e5addde9ee51a20a08ec5387cec6a52539e880bd19896f06d56bc6ca414abdf78ce566e5362973f708439735226f0a9d0bc5a901e1fb69055d20bfdf24922f6352fe8e12d1fb8b7ddb2f1366183d333164033d27a0a24fa8e5f16b22938d52dcc2b2d0cd4238ed0cfea4f8fa7334ef255196e22dbdc397afe1998481015bc1939093253f489911704bce6d629c7060aa5956c8d8c72fdb7b3f0694c3e4314f44bd3a1bd57ff4e415efcc491b88d9b04ca02437c4c1e2c4689f49cc58deabb3544021f002f8a", 0xf3}, {&(0x7f0000002840)="625710bb1198225c4e394e1c8f3f78bc3ec4327919b811e2f091eeb9487f255e0b4ff98ff9337bf7ae816ce888136402a83ff280d70b86e12c7b3bad414006d1e0127a68ab9c37de5f46e78855d165d4216a59c4b5ad953f77090a20deb83a334a56b899f9396845320840faf656e51e6a877dae55c384c73a5a6e4a25e56813e9dca71f9ca6636ff7683026c88e0aa3829312050c45e5717dc8bac33d13d9", 0x9f}, {&(0x7f0000002900)="a79643b943abf888611c7dc56d1318fdcaa699e4cadc7c6dd46f5d3dfa074bae805f4ece127f0dff51", 0x29}, {&(0x7f0000002940)="c4", 0x1}, {&(0x7f0000002980)="1f3a90281f0ba0d5dbe04f1d5783f67c9f21eaef3c45c090e50c7d9d5fa06ac46c302c4bb24cd22a48d532f6b20b74355ca10ec95d226de69f175392acb6d67d06846359d7f0ff949beaf4be0f3d220dcee75023db4ba7231833841cd1564eb6ea39fb6beef2517499ae114b02e1be356475bf1cbc606ae22b3e13ec4badd104408735c853b9bd000166d1c4b53ed560fdbd9f9839b6333199a923e3caf43a610678fb8260a65eb07cf9f9cef49c4bb89779ab44a1c906f1c82758f244218b6cbd2c42e2b5bd4dd5071540e92f9968bb0fff6f5e9883f9889953592d81306a9fcebc422332120267dcc4b3bc35f24d8c50f19742b487360c8cf326ee", 0xfc}, {&(0x7f0000002a80)="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", 0x1000}, {&(0x7f0000003a80)="6d2bc06ce2b489c569f138cedea69fb95082e3e092b2b1e14b70f1c1556eeaf95f42a29ddab200235fa43aef501ca3af785deafd4d080eed094c5de2f2fbf39dbe504d1d8bfe8d0bd593ed929915752b6469e77fe88bfecddfc9160d0df3884b44e4e07d3dda2cb7da29135ab3fb7eacaebe0ebcd539d658c7b6e49d5f24334fd84b097d3be19c0a8587f535b817a712e935df65017be1a379d33db5fa24c12d26646a4c465d953e3f6f8fc7066b193db2972306e9299726c5abd0c28c13dc10d97094930fb275ee00cd4e90c2447e25d269d995a097ff7001d6", 0xda}, {&(0x7f0000003b80)="9bcb8932d4710a1e38dc0d4aa9c2292b8269d10ed83c733915e341cf0803088da4867784d903f7b5472fd72541979ac497b0c13ec6895d32961d759be45b40b9a22d1f63091c47b35557594207eb13262ec9a4013af108d4b2498d40cf9f025d69dda8179bed10c4c4a1ace230c6f3d4fadb737b6fe785cab090365f20fe4332227ca12cc3dfeada", 0x88}, {&(0x7f0000003c40)="6fba129d6059c56a3d23af0c0aa062a78640c02ccd9fbe91c0ec9b1d3f6281ba36b26780bb75d01c5f5d30301ee3cb29aea4b061b2bc50979a691a603e164b2e200956b2e6e54e86687110ca43fdd49b2ecf3eb80ede3cc0ae1fc7390a42fa7ad3651a3456f07027c36e4495d073cd9a55444c", 0x73}], 0xa, &(0x7f0000004000)=[@cred={0x20, 0x1, 0x2, r26, r27, r28}, @cred={0x20, 0x1, 0x2, r29, r30, r31}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}], 0x80, 0x4011}, {&(0x7f0000004080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005400)=[{&(0x7f0000004100)="35ba2ebdf31e3e54613b42253336f8478f037bc591a93ae89c00f7266945d4489e3cdcc93a5476f928", 0x29}, {&(0x7f0000004140)="ead2dccc2410a3719c8cd1f9e3607b670c4b5324ace0c189be0ac3c14bc12f1049714e37eeabe9e9264d508a0694945a7baf138e6cad7abb2fabeea1bd9b36497627e8b50182e902eb3de42bf7371664a56f30936a49ee4ea570b5aec44129f1b48d8aeb7ebcdb9d73e09bc230b7027a588a3f4872cdec7f776d7d52214b79048c913959514b84255c1032952a71df55aebab542a64b24eb1375f9a8532335405f800b1253f2e5e3b72cc3640fb99ca89f3c128520f37765063869ae63bfeb0abc3332abdc3b07c846ff4699c42660a5272524d0424ae4fdc981c169", 0xdc}, {&(0x7f0000004240)="d515b7204b02722d67d2d7600e5d6544d0cabaad7d2092fb300cc0815f2a339bbbbe1906130f289a0e5f57c912de84d8a97e18f240d6415856c7f4e51300cf74a296d5ef545e9ee8953b07980491eac48d7a261a66d2dcbbadadc7fa32bacd87695557228efd5433456cbfe24ec2bbde696cf3c81578e06cc3f298b053e609d476be6bda6eb61955f9ee07173bee846ef790731f4bd71ad91afff49bd2749837beef28a69ea6a2fe0a6343962cf6d2ad2bc1dd28d3c36babc23ca83e539e8024c6", 0xc1}, {&(0x7f0000004340)="1db3b71568e9e710287891dc441f9c41b9321a2cef26b2a697c92aeef3991063d6f4658848d9d3d2bff3af35d4312b4f9eca001d365861557bc31faf592d436705a8e800c4b9336655d70d3a28a27573ef2bfc00c204713b48e87af0a4d2766a0b6277e7bdabbb57f2ba72ab4fc8978c688537d799e4f7450bfbfc0f32441c86cb1ab6d2fe0ae71d69abaa62c2f0d4ff250f8d5bdcb47a5cf940d310f8c3726ea96a4ea24c57e8b09633b2f3f1ae2aa0c1cbd91d6d99e2b90be6b198c93b49c0ec251c52084fc49293b36171e0c2118f874e78a31403b2c863fd1e95b869dfaa0df6c1030068507fa16609f3b36d02b6134b205e2db651e454c72d1c2453a9932a55ac6d96ff20d3358ab4e5ca366b8faa66a206bad89e95d469a18391d2a987c0750db79fd0c274d74ecca4467dd859d6a3e0e500b55726f40a6db3c2666a85a0e94e2579468af680eda3755d13e2860e50cdd41339b3dbb9790d4e99a9ad88c7e110dfb8eec8d64a02852290e0e5fb8bfed9ddedf51469bab2a57d6782fa4269a48d001d992b9109325ba2375769ecc916feb49c7fcb51efb06d7f777a102001973cf42eb31488ba5f84a4dab271f08f3c657fae0dd948dac9ce6db10bb53eafe965e87dc563f4988fbf5a16e12d89962e7d731afc34d89363280308b6b166ee25370ede1c9cb75a4ec1ab0fdf83457ceab16fb1c762823a6fee72480a8f91b4687f65caec98a0a60fa69689171cbe0c0bc16f602faf73b93f5f2ba33510d946c4bc9bf4c1f0da8459d8991404f1f45fda4f28b7936b94e970868b946e2477ff79a1eb48434c831dc7b899749f8e3e480c9410612184dd9500116ab05a530039c56535bdfa49db534b56526d36ea67bae10d00066a955fa075f078bba044bbf0f08722b7c1c8d35c69e77aae93d1980c69c1c4587eeea65529e1b5cf7bbe6e95b116c36dcfe62128fceb9522edee004bfd98fef9a0ee5d7034502977511d7d520723222a6a64cc024c741d3648981dc3e6c1ffcd750b6eef949ef29f3367f9a34c007b7d011a9e843dc5eaf4ddb5d6757b8113c2597896f72e5fb96e824d2db0ca8cfec79a77f8b6ec63e02073aa515d8e85edffada6a38758a76fd2d3d709e3285dcabe24c243271bb13fedb5c49828be67d09ea78a54d8a2ef9003f3aeffeb21de4f9007130dfbf2633af8972538c31fd8cea19a28a04a4ae4dcec1e33b993f47a2b1081f5ba6849e6dba01beafe66dbcb200e5c901e45f5cfe72516bdaadcc799add0c8de6cae6d1937f694f91a5fd0d587d80ee8bddec91da9e0191872825a8f3b0ae2756e93f89e3fc9b101ccbe62852afc21ab9f9a364a843ecf75b5e15cdd50edc276395ff556e00a5c4da87c2ce411183fd31e7ea8cadba0308b01c251e7de98f80615a14b36d6490820300fa2009dfb4952094ff1bc3d6505fdb76eb270afc6d6e132f57cd23a6ce073dd6a15493b0ba0e252c1845a14ebd6b1593bc27603b362a13e3247b3be50ff5c6e37619b77c6f3fd55a74f1fb9f69e1cb3bd5fcd46ec3b5ee4a2994efe7086392be99d908f17f38a4d7de965ab448828d9a04285a3bb393aceaff1e06df408dc3fc45564da5bc0f5aff9c7758a10b1f530c32377c0e2fe3615771d8fe3eb160b1d852cf051403c5dc7dd35f8aea61b0cf89401bb1dcb24920585976292496f57607e176af05c8fc00a6fa4624e9a1cb13b922498432446fcffebf189b8bb29373097ef5de3ba822216ae506e12814e183d99034e9bd3e11230886622796f72c9976a84163f5d879f5b3e820106510876b5e226656e6ce16a7b063a87de2a540649b406b0694fb433516745a64a8b895dc6e48d3874a5706ce59f36a2905d83f37540fcc14478bed191d2d13953f1b8f900bb37dd1978e19181926c3a1497ac75922e3e728f9f65d156130253bd81bdb3e9f6769b58298fec403ae0c9861eefd98567262f845061ddc1275760b240cb11c068211f22ff1d031ccaaa07623fd5491eef2af416676c520eb866ae92d69a16f73f637c8158544a58ba406ff045cb54cf186cd05db7f3c4dd5069734fb17d28eb55f8437b725249285456800369841b18175e44a69fb56442f5bad8aecf79d413f8319c2eac99efd083c88765a77a69780d6e8b26aabb9ff1faa610039287e44cf1f9bf2022d2f63254dcc2cab852d535186750628f188105b151bfc6aea009e8a692579d2cc6ee9347be26b0a6d832d9f2c89f51b3798feb8d691243c1e884b6c627da5a3d7fd372dd09a7825b12e908a3bcd4d962cbeae1734faa9f1a9563e3449eee38658098c6d3e53cc09df49b1dff40b1a7f90be1adc594f4b55ccf491548de2ae2e7f2a01008db15b1b29d3a49220499e616fd72ab6bea64fd015c88077dbc71e051c651f5a806651e1910c50094cff29374e3a2c7421fecb4796ea5f5119d0f8b97f2c274ce30d767588ebdec40b9d39e3b670142efc9e091b45fb5de3c8e1f26a4d5cadc60849dc4c5db965940e882dd6b0960cc067b762e81b373fd79c98c564b3cc024885d395972eae862635cea1cafe2dd65d7b72a5de76a8d6759b0ab75a98c176df63b097af0e5d0a1d7037612204edc9ce4b6d0a7febf15cbdd41647232c6a91851b0e281b58a80ef3adc6737e1dcdb12f5de0ff98ad2c8cb2e092b41bacd46f11bfa2ed5f420de18eaf5083ded99d2ff0b792fc749faba7fab37b4561766f180e467245239504489110a23a2a1b98472e2412e0769ab9df580ff1d12c7a87e0518a5fefba977eeb746f04b1146221c64f8fcc3e6dcccfabc762f281c226023dca70ca60ba353f30c1c41225fed74b4e9cc2fe318336a4f250e60dcd3bb3f84cbedf72c2066fe7da50830a48793f7e482430e17745edbd2d5bcbc69db32b5621b0c756cbcf9d5828b6949274449101a118efcacebd69bd53e5ba6d75d6ef80b31bc57ba94e10282a5c69e564a2a0dce0c28cfe9d8f3c4f9c9d2743222ab0f1e60656c1c78226737233968680f2ed2b7a4bf61b3740999d772e9f9fd890ad70f30efb8a8c74c6007e0337f6bba593cd3f842dac1dd75fd0885aa41933404db2d1abd3129d6a07bd4ad484b8868d0a7517ee9f6aae53bbe060bb1ec646122742c617b8ac48a1a53b441b255d980ddb289f255c24518900d5a32563428b192dfe8ef4a34bc60db77eaf9fc28d72128030ee8709cc103dbec683ceb46240a528d85bdc5e1e096b56db37129a746f3d02eeaefb551f42d7cef05fa627a11f54de4ed8c89a92d308524dc66a5af4fdebed47da53af929e62a9ecb942978d4be370c85e84165640479938816f72f4413c56f3bfbfb9ce86ff497e0bf33e6c5fb20f4ea2e91c693aeb3891d3ab154529d2c0cdc24dcdc9a9d2b9564b0edc6bfb44beff64001f9bb265ff2fc3acfd415ad6ce83de6e719158f31dac86191def4154771a9ca334c54b1c3469fe0892053b382e07811d08ed92896b647b1efacbdbb2e7abfa22ecc785f70bcad41e81924453efd8721408b834f5de21ee34add97934d23a3a4ed849739386f2544285f72164b64def4697afc055b96f79631b17eef871984f25095effb53207679460fe9c5c3d60067fff3e94a425363347147ba0e9b4f340295b44d9ea46ba64beaae8b57176949e5894c900afd7fe15296cdcb723ee2b025b1e104cd391eabe7d64cd8c233ebf55117257d976ec8b99676d4020052493b28f227bc4e6d713ce9efd76d58f304772e3da83af28a855fdaf61b3084538e27e89a49989373ae21cefa140b09c46600853caee492c2343057e1a73183a57719f93da2aef792b47f8effe7291e22167dd1991d244775bd0f7154bb43ffc3a141de7dec06fb8fcdd9811a57bcec8de61e7f04e24081f9482e973ae6a22e1d4d2d76dae952cfaf65c35262b698f1cf211ce67fae620d3740f5d086bb9376f2787f9c2692509c812f443fe1b9194f96d9976de9fb7b2bb95a2c2866aa700b3aef387bf1c47e039df79416894ac797c024418ac5dbccddabff9efd7f135f1d370059931a45ad6c82e779dd7a6deff3764dcb21c173e4dfb9a15a972dfa562a4fb8a9bb33f8bc33052239e33ebdc7d22f3c39f179e754393e736c9e6300ccba3de09100d76bd8c01766ec058946f9ee58d03462e1c42fc3323e434b46cfd34215494e42eaa0b35d264a4a288726baf6f3e17214952512a38e7273b274c5e349130d450f972dccd8d193f7c1c6a7596f0c9fc61eba178a3290f47ec747da0c08db84261f78bf09a073f582fe6b50930e165a331590ef7984a977c6543156cbe06279eb4f32d3602554d6217ef1da6f16576a894f2b00bae653c8e033ec9f7548c9567cc63a615bece7679b14418aefae09c11178077413dbe5bcdadef321de14bb64c92e0e5d14054dd144c65cf22aaa8216f5c20d164b0802797eaa8ff95c760cfa401bb6b16e38ff2f1ba0a616bf1a004f1fa8ae1c42ff866956ab2af9cb6321643fcfa5c785f9a4e5be574cef58e42486c61a4d6875d640f8b982d354b838d009f5e544e69168e1de2519971f91062e0b9a666768382125dfe1c1fc89270c402f09653c52748014cb5b6289e11ed64e8b3c82b7d220565d316dedddf62bacfe3388616753abfde0b2c278dc53e3d06edb0963ce5c51cbd4a34d64a59dd43986305371b83fe70b382906c63c5a75eef6e04a856d561bd5e26348753a34d932b89948063c32fb4ab42c49fb8ba88b032ee7d580a97ae3543416fed6fbe3b80dfb3737ec615a44c340a80e3c948c12ad35d74a48dd706a4c4642a1ca82f0681c2201b21c555eb3cd3846b96064a848f34fa468291732dc27922b57824a1622f90a38cb106c2d20e0f61b7fdff5f1918b8763ee04aa72a431f942e23e6bac0d8fe57d1ae060fbd4f7beb9d533efc2472e859b2ab75928c54b0a3b755314ed49e1bed7c6cd5e249b3e445fc2207ec45c56497920834c918bb3f3816abf63569c5bb6e08c14ed909337bd4a36f634d6e5847c32966a259616dd3b24fd0947af95f919bc1df40481b977161fccd48a5f94c81af945e997cae2757dacdb7b8b1fa489fb3befe2b2392eed69da250f1c93a4e5d17eb7031ec7648c3f32f491d597b1668755074d40b21a564ab7146a278ff2cf672f4dc7dbdadeee3a06fd3f935f6c742621277c1c3d96be2367c192a5f107c087ab51de1c0f440696197aa600daf11249cb6aa28b721ec48f2e40980c3ac52cba1bb1d2858008069cd0f97301d4064cef5192fd61bf78f2023d093e3195578fa5db4028f7ab03d6713c64652d4c395429c5b7e168c860c47a26dc1b6ad3074a30de8075eaa12322a79a0aec1949277dba8848c64ad18a3098b2d8b7aebb3bc0e27dfbd97c6367d32f76cc0a4aec0fb58e7218da50b7fff7bc613d9429d9b5c405b423855c3ca3df57f7e0c85eb16cd4f7245e813c0c4af641d90e655da9f5f21438bda7b4d3908c1fd6c80206483fa21959e01e56cac4453e02abd0e4b9671f4190b8d5aa927eeffa971bb908fbc87800bba10506c3e6171741cd399a094d625471a695d3381379226cddfbc77e24bf59d0b28e10175af933e014054f8bdd1ff91f4c131d6ec752da8d053b7cc547c063f207132dc94348afab0d8eff13813c243a9a706ecc0cbe35a4088b2e9ab1799158f79586ab793c1d2b9cc90e763f89f891efce1445f0f3f0d2a827328dcd1183fcefeda20a811a3d277a00deaad5afe1a88cf338ef0384737af04363bc4a203efd5d5bd4505a258d05aabccc921b9551b829710315020a3331b552", 0x1000}, {&(0x7f0000005340)="749bcc8281a9f87be73f1a175f8dba07b54e17a7aa13c8bf3d77ab9872bbf905acd2a04cab38470a4dd656cdfcd9ebcdbcd5b0c305b56da700693b0bf37f7ab281db5f84bd57630a940fc66ca5199cc3e37246a538cfe93864c3f2bc59583e92499d445359ce02267d53487bfa8f6b64f53e10d3d15575a4992b2771e99d00f26475016d8cc638c4120aeff82cca6f95aff0b0bae3ee0bb77e4faceba1ee6b87a85d4cb6b7ad048a2f26f637ad7d365a3825e33614a5cbb20f55", 0xba}], 0x5, &(0x7f00000056c0)=[@cred={0x20, 0x1, 0x2, r32, r33, r34}], 0x20, 0x41}], 0x5, 0x4001) 03:35:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fcfdffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363afffffffd000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:04 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0xffffffffa0018000, 0x4280) [ 777.563510] overlayfs: failed to resolve './file1': -2 [ 777.605742] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 03:35:04 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x1f00000000000000, 0x4280) 03:35:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff00efffffff3f0000031700009d617570af1956eb7407a90080000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000001a0ffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="4c00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000940)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000340), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x60, 0x0, 0x200, 0x70bd2b, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) accept4(0xffffffffffffff9c, &(0x7f0000000080)=@in={0x2, 0x0, @dev}, &(0x7f0000000200)=0x80, 0x0) 03:35:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00480000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:05 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0xffffffff00000000, 0x4280) 03:35:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000100)) unlink(&(0x7f0000000000)='./file0/.ile0\x00') write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x5, 0x1ff}}, 0x30) 03:35:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fdfdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:05 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x8000000, 0x4280) [ 778.230200] overlayfs: failed to resolve './file1': -2 03:35:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000010000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 778.300456] overlayfs: failed to resolve './file1': -2 03:35:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000200080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000940)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000340), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x60, 0x0, 0x200, 0x70bd2b, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) accept4(0xffffffffffffff9c, &(0x7f0000000080)=@in={0x2, 0x0, @dev}, &(0x7f0000000200)=0x80, 0x0) 03:35:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000ffffffffffffff7f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:05 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x700, 0x4280) 03:35:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000400000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:05 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xc0, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) getdents64(r0, &(0x7f00000000c0)=""/42, 0x2a) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff00029d6175d8e1dbc200000000000000000000"], 0x1}}, 0x0) 03:35:05 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x7400, 0x4280) 03:35:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fffffdfd80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:05 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x8001a0ffffffff, 0x4280) [ 778.731055] overlayfs: failed to resolve './file1': -2 03:35:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000000)=0x1f, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000ffffff8c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:06 executing program 1: mq_open(&(0x7f0000000000)='lo.\x00', 0x843, 0x0, &(0x7f0000000100)) 03:35:06 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x48000000, 0x4280) 03:35:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000fffffe000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000600)=""/150) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000008c0)=ANY=[@ANYBLOB="080000000509a0a04210886cd791fd82763f1486dffa6db2f7e55b3ff79cbbf39ffbc4253f1bf9e7a198814a36a6e127b60ebd831b766856f951023db8ebcce612277491d4bd10f7c0b39b6c", @ANYRES16=r1, @ANYBLOB="000c26bd7000fddbdf25010000000800060008000000080005000400000008000600ff0000000800040000000000080004000700000008000400080000003800020008000b0002000000080008002000000008000900b4e300001400010000000002000000000000000000000000080005000400000034000100080001000a000000080004004e24000008000b00736970000800080009000000080001000a00000008000b0073697000080005008100000008000600e2fcffff"], 0xc0}, 0x1, 0x0, 0x0, 0xc0}, 0x24004000) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x800, 0x1) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x640000}, 0xc, &(0x7f0000007000)={&(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES16=0x0, @ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64=0x0, @ANYRES64=r0, @ANYRES16], @ANYRESDEC=r0, @ANYRES32=r0, @ANYRES64=0x0, @ANYPTR, @ANYRESDEC=r0, @ANYRESDEC=r0]], 0x1}, 0x1, 0x0, 0x0, 0x20008004}, 0x0) getsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f0000000380)={@multicast2, @local, @multicast2}, &(0x7f00000003c0)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x80480, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000240)={{0xfffffffffffff045, 0x4e56}, 'port1\x00', 0x40, 0x80000, 0x8001, 0x81, 0x7f, 0x8, 0x7, 0x0, 0x5}) splice(r3, &(0x7f0000000500), r2, &(0x7f0000000540), 0x81, 0x6) getsockopt$inet_sctp6_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000006c0)={0x0, 0x8, 0x3, 0x4, 0x224e, 0x10000, 0x4, 0x6, {0x0, @in6={{0xa, 0x4e24, 0x5e, @remote, 0xffffffffffffffec}}, 0x7, 0x3, 0x9, 0x8, 0x9}}, &(0x7f0000000780)=0xb0) recvmmsg(r3, &(0x7f00000034c0)=[{{&(0x7f0000000a00)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000a80)=""/4096, 0x1000}], 0x1, &(0x7f0000001ac0)=""/185, 0xb9, 0x8}, 0xffff}, {{0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000001b80)=""/189, 0xbd}, {&(0x7f0000001c40)=""/177, 0xb1}, {&(0x7f0000001d00)=""/198, 0xc6}, {&(0x7f0000001e00)=""/20, 0x14}, {&(0x7f0000001e40)=""/250, 0xfa}], 0x5, 0x0, 0x0, 0x6}, 0x5}, {{&(0x7f0000001fc0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f0000003400)=[{&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000003040)=""/217, 0xd9}, {&(0x7f0000003140)}, {&(0x7f0000003180)=""/130, 0x82}, {&(0x7f0000003240)=""/222, 0xde}, {&(0x7f0000003340)=""/138, 0x8a}], 0x6, &(0x7f0000003480)=""/30, 0x1e}, 0x4}], 0x3, 0x40, &(0x7f0000003580)={0x77359400}) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000003700)=ANY=[@ANYPTR=&(0x7f0000003680)=ANY=[@ANYPTR=&(0x7f00000035c0)=ANY=[@ANYBLOB="0e8feaa03b9355d4aa7666e6f2cc9aa59e8b4322f74004682ac27adee3859232c4fd296e859611a76e236333ea64b80bd08340ddc2eea1c07195df2f44daad1b71fc99d4c26e1dc21d2f2fe62ce8a4869d053cce9767e0", @ANYPTR64, @ANYRES32=r1, @ANYRES32=r4, @ANYRESOCT=r0, @ANYPTR], @ANYRESOCT=r0, @ANYRES32, @ANYRES64=r0, @ANYRESDEC=r2, @ANYPTR64=&(0x7f0000003140)=ANY=[@ANYPTR64, @ANYPTR64, @ANYPTR, @ANYPTR64], @ANYRESDEC], @ANYBLOB="0002f2008a9affe0a5269e7fcd3233c633bb3b987fd47bebc4de96587a84ba5bad2367c7b5a068b809423084f5febeb3f62984498bca547e0576eaee43ff702573fd36d930afef73bef9b52db1068eb6deb23c852d25542395b0c1712023d15dc4c449cf8bcbdd63e51278a7583f01ab9f47424ce25e1767b07634d60900000081789b0e2d273c4f20ea22c7d6acfc10af7f8813b1df6928e2058c027f13324651a05a943d96c641841c56ea92767b05355a0a4105097531668082cd772ca7809b13f6e1804bfc2ea98288f72bd6ce31c5c2ba82f6b305650751dc5c3dfa76d89e88fe9bd1dc917d894cc63ee354ad89a9755ae8f2dc"], 0x2) accept4$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14, 0x80800) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000004c0)={r5, 0x1, 0x6, @local}, 0x10) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000580)=0x8, &(0x7f00000005c0)=0x4) ioctl$UI_SET_LEDBIT(r2, 0x40045569, 0xc) 03:35:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000480", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:06 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x3000000, 0x4280) 03:35:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000100000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:06 executing program 1: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000200), 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x4) listen(0xffffffffffffffff, 0x0) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000180)) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000240)=0x3a0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) r0 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @remote}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0x0, 0x20000802, &(0x7f0000000080)={0x2, 0x404e23, @remote}, 0x10) connect$vsock_dgram(0xffffffffffffffff, &(0x7f00000000c0)={0x28, 0x0, 0x0, @my}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000008c0)=0x7fe, 0x370) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000480), &(0x7f00000004c0)=0x4) sendto$inet(r0, &(0x7f00000002c0)='q', 0x1, 0x0, 0x0, 0x0) poll(&(0x7f0000000000)=[{r0}, {r0, 0x40}, {r0, 0x100}, {r0, 0x20}], 0x4, 0x0) 03:35:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 03:35:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000023000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 779.382654] EXT4-fs: 13 callbacks suppressed [ 779.382667] EXT4-fs (sda1): re-mounted. Opts: 03:35:06 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x4c00, 0x4280) 03:35:06 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x12) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x4000000000000000}, 0x8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000300000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 779.516747] EXT4-fs (sda1): re-mounted. Opts: 03:35:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="003f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:06 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x4800, 0x4280) 03:35:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000000c0)={0x10000, 0x5, 0x1, 0x9, 0x4, 0x9}) [ 779.711291] print_req_error: I/O error, dev loop4, sector 128 03:35:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00011000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:06 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x4, 0x4280) 03:35:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000380)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000003c0)={@multicast2, @multicast2, 0x0}, &(0x7f0000000400)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000500)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000600)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000700)={@multicast1, @empty, 0x0}, &(0x7f0000000740)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000780)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000880)={@loopback, @remote, 0x0}, &(0x7f00000008c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000900)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000a00)=0xe8) r10 = openat$vsock(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/vsock\x00', 0x101040, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000640)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r10, 0x40086424, &(0x7f0000000680)={r11}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000b00)={0x0, @broadcast, @broadcast}, &(0x7f0000000b40)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000bc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000c00)={{{@in6=@ipv4={[], [], @broadcast}, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@loopback}}, &(0x7f0000000d00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000e40)=0xe8) accept(r0, &(0x7f0000000e80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000f00)=0x80) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000000f80)={@rand_addr, @multicast2, 0x0}, &(0x7f0000000fc0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001000)={{{@in=@rand_addr, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000001100)=0xe8) recvmsg(r0, &(0x7f0000001b80)={&(0x7f00000002c0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000000440)=""/172, 0xac}, {&(0x7f0000001880)=""/190, 0xbe}, {&(0x7f0000001140)=""/238, 0xee}, {&(0x7f0000001a40)=""/112, 0x70}], 0x4, &(0x7f0000001b00)=""/107, 0x6b, 0x6}, 0x41) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001bc0)={0x0, @empty, @local}, &(0x7f0000001c00)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000023c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000002380)={&(0x7f0000002400)=ANY=[@ANYBLOB="1c070000", @ANYRES16=r1, @ANYBLOB="100126bd7000fbdbdf250100000008000100", @ANYRES32=r2, @ANYBLOB="4c02020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000100000008000600", @ANYRES32=r3, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r4, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400080000097d31ad8d536cdd6ca72e0038000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000008000300030000000800040000100000400001002400010071756575655f696400000000000000ce8b726f4ad838083bcb1ac800000000000000000000000000000000000800030003000000", @ANYRES32=r5, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="64000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000340004000008000200800000840001ff0000000006000105030000000008ee56dc5a00000000090601010000810005060000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000080000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400d2000000080007000000000008000100", @ANYRES32=r7, @ANYBLOB="2c02020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000600000008000700000000003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040000000000080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004001f00000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400000001003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040002000000080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000500000008000600", @ANYRES32=r8, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000500000008000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="b40002003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400600a00003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="b80002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r16, @ANYBLOB="08000700000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r17, @ANYBLOB="08000100", @ANYRES32=r18, @ANYBLOB="fc00020040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e0000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000800000008000600", @ANYRES32=r19, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000008000300030000000800040002000000400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400ff00000008000600", @ANYRES32=r20], 0x71c}, 0x1, 0x0, 0x0, 0x4}, 0x44) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) [ 779.798407] Unknown ioctl -1067953333 [ 779.916825] Unknown ioctl 1074291748 [ 779.928958] EXT4-fs (sda1): re-mounted. Opts: [ 779.961630] Unknown ioctl 1074291748 [ 780.007136] EXT4-fs (sda1): re-mounted. Opts: 03:35:07 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$KDGKBENT(r0, 0x40046104, &(0x7f00000000c0)) 03:35:07 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x500000000000000, 0x4280) 03:35:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000fff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x200000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e20, 0x4, @remote, 0x7}, @in6={0xa, 0x4e24, 0x3, @mcast1, 0x3ff}, @in6={0xa, 0x4e20, 0x56, @mcast1, 0x200}, @in6={0xa, 0x4e23, 0x100, @mcast1, 0x4}], 0x70) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90008000000000080d8e1dbc2"], 0x1}}, 0x0) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x7c, 0x20000) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f0000000140)={0x1bacf914c1bae95, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}]}) 03:35:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="004c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000fffffdfc0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:07 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x1a0ffffffff, 0x4280) [ 780.337194] print_req_error: I/O error, dev loop4, sector 128 [ 780.345545] print_req_error: I/O error, dev loop4, sector 128 [ 780.352612] print_req_error: I/O error, dev loop4, sector 128 [ 780.365530] EXT4-fs (sda1): re-mounted. Opts: 03:35:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0xa, 0x5, 0x0) sendmsg$alg(r1, &(0x7f00000dafc8)={0x0, 0x0, &(0x7f00008ea000), 0x0, &(0x7f0000000e8e)=[@assoc={0x18}, @op={0x276}, @op={0x18}], 0x48}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1800001b2e00ffff00020000004500000356eb7407a900f4ff0000000080d8e1dbc2000000000000000000"], 0x1}}, 0x0) 03:35:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000003000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:07 executing program 1: syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x1c7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000240)="2d42d54e49c56aba707070f00884a26d003a2900bb8dacac76617d6b6e6823cb290fc8c03a9c631064eea98b4363ad899c6bdec5e936dd55a93dcd4a78aa8f7eb93061a9b2044b98933f8851f7d61da1ce8b19eaefe3abb6a52434d6fe370fe7d924ce20ab4eaec9bdd36740e127730e90f2cd72b828", 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) syz_open_dev$binder(&(0x7f0000000c00)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) [ 780.441611] EXT4-fs (sda1): re-mounted. Opts: 03:35:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="006c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x2, &(0x7f0000000000)=0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x80, 0x0) io_cancel(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x8, r0, &(0x7f00000000c0)="d40295f2020c2ab1d286a25d1a970e3459c51b5147f2b234f3f0f4e4897f9eaa64b7fe3c4876fe63b8f330e9c9f717861ba1bd73f6775c688d62472991d092e304370f5fa14893e1e5fd09ccf4295c551e599fc599120b8a8d0fdb887099149f03d7dae76319040f2ede51765bfeaed4e3970426381ec90981cb21", 0x7b, 0x37d4948d, 0x0, 0x1, r2}, &(0x7f00000001c0)) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:07 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x6, 0x4280) 03:35:07 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000008004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:07 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x6c00000000000000, 0x4280) [ 780.791502] EXT4-fs (sda1): re-mounted. Opts: 03:35:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180000002e00ffff00020000004000001a00dce8144057ee49b056eb7407a90000000000000080d8e1dbc2cdb8f8a054000000000000fabe1286afea9cbbfb24939a2ac3e3ed6a7d52667b0194996b6cad219e3643ab2a70a6e635e3e7bab29e39858206837d5613999e908778d36a9b74ab65e52aafe2aa68bca2fe7e4170"], 0x1}}, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x24300, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000600)=0xffffff26) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000001700)=ANY=[@ANYBLOB="001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0c600aa74ea810000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2e4bd4832068afa4a619eb8adbfc90204ffbf71bd4f9f0ede6ee5ff34da2a323ab1824fd697f979101b046121c3994785100ecdcbceb3a194e08eeed143f75dcad1f445c6e5091cf18b62c58cd4ee8122a8c1f2d3e19e35849cf4049cb43a8680beeb9ef3c8c9c21b77d3d2949ffc7a5222d9ade5a2b2707ea81d0b5121f3f23f9d25492d65af160000000000000000000000000000"]) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x200000, 0x0) 03:35:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0fff0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) [ 780.879249] EXT4-fs (sda1): re-mounted. Opts: 03:35:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6000000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:08 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x1f000000, 0x4280) [ 781.023877] print_req_error: I/O error, dev loop4, sector 128 03:35:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xbc, &(0x7f0000007000)={&(0x7f00000000c0)=ANY=[], 0x1}}, 0x0) 03:35:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000023004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a10200000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 781.260550] EXT4-fs (sda1): re-mounted. Opts: 03:35:08 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x400000000000000, 0x4280) 03:35:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x20000) sendto$unix(r1, &(0x7f00000000c0)="428b69af3a57ccad2a3721505254edee7381b91aaf2832257dfd25a3b3657e169c666dbf63e067bda02b1361a4470aea14ca2df057379e6a0dcb30634897d078828cb7291603e6fec990cbdc30ddb88af0b830d29fb81f9128301596321239b0b32f6eec2094011cfba0bb0869baa87b0c764ed4c3a3548d", 0x78, 0x14, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="181200002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:08 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x7a000000, 0x4280) 03:35:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="fdffffff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000230000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000001}, 0xc, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYRES64], 0x1}}, 0x0) r1 = dup3(r0, r0, 0x80000) timerfd_gettime(r1, &(0x7f00000000c0)) 03:35:08 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0xa0018000, 0x4280) [ 781.658975] EXT4-fs (sda1): re-mounted. Opts: [ 781.694349] print_req_error: I/O error, dev loop4, sector 128 03:35:08 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x1, 0x8000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r1, 0x400}, &(0x7f0000000180)=0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000200)=ANY=[@ANYBLOB="184000002e000e610002000000000000033778a435617570afa90000800000000080d8e1dfc2151c4c391590355188c718a6bb070000000000000040a7158741b0e4ec7ec131ac367041bff3ef93"], 0x1}}, 0x0) time(&(0x7f00000001c0)) 03:35:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000010010000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000070000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:08 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:09 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x68000000, 0x4280) 03:35:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000f6ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:09 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x7000000, 0x4280) 03:35:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180000002e00ffff594e8a0d030000009d617570af1956eb7415a90000000000000080d8e1dbc2c6865e9742c70340ff07000000000000e097d9a40794dd70e36be17a327e91b7bf9c4b48a6575f9645a8f15ce32e8019a8750dd5c82efe01a313a37aba5106a10a"], 0x1}}, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x37) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)) open(&(0x7f0000000240)='./file1\x00', 0x208080, 0x2) write$P9_RLINK(r1, &(0x7f0000000140)={0x7, 0x47, 0x1}, 0x7) 03:35:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000580", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000003f0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:09 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x7a, 0x4280) 03:35:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1800000800400000030000009d617570af1956eb7407a90000000000000080d8e1dbc20000000000000000c1c97bf7bf27a11bf791687ede565f9af2e5a78c46f4621bcf7d009702ff8611b0740eda51d0c92be5ebcf3f98a8cc86662fd0b2e9b8b7b602ffbe5066bbbe22edef7e90e8f3baf0f40955bfac45d7652674f007324ccf305705dc42e7b583d17891b34eef79656d4e4508988a239eabc56c"], 0x1}}, 0x0) 03:35:09 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0020000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:09 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x7400000000000000, 0x4280) 03:35:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000000000003f004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff00020000004000080000000000000070af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000}, 0x2f7, &(0x7f0000000180)={&(0x7f00000002c0)={0x7c, r1, 0x400, 0x70bd25, 0x25dfdbff}, 0x7c}}, 0x40000) 03:35:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000074000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:09 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="004000000300005ac4067570af1956eb7407a90000000000000080d8e1dbc2000000000000000000000000"], 0x1}}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0x2, 0x30, 0x1, 0xfffffffffffffe00}, &(0x7f0000000200)=0x18) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000240)={r2, 0xe7c}, 0x8) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) 03:35:09 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x4800000000000000, 0x4280) 03:35:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000004c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:09 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000280", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000e31e8ccf1a21dca7af19563e756fab97393cfc00000080d8e1dbc2"], 0x1}}, 0x0) 03:35:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000000000001c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:10 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x4c00000000000000, 0x4280) 03:35:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x900, 0x0) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f00000000c0)={0x7, 0x80000000}) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:10 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0007ffffffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:10 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x500, 0x4280) 03:35:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000c0ed0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="18000003000000ff00021be144da853691000000400000030000009d617570af1956eb7407a900000000001fa96f799cd31fdce8628d8c1fcf9cc4dfcb62791e6f53b531b3557a1166d03d6f1cdab3807b929fb3a83e56a73323a3ed05f0b8cd6ae8169d187827ced5d276c2e7a97aee7f9f35a957ddea4fb46044bbe58f31f571209404dde4"], 0x1}}, 0x4000000) 03:35:10 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:10 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0xffffffffa0010000, 0x4280) 03:35:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000ffffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) rt_sigtimedwait(&(0x7f0000000000)={0x3ff}, &(0x7f0000000100), &(0x7f0000000140), 0x8) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) socketpair(0x1f, 0x1, 0x5, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$NBD_DISCONNECT(r1, 0xab08) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000180)={0x1, r1}) 03:35:10 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:10 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x3, 0x4280) 03:35:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fffffe0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d6175701dc0225a2bab1cd600000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:11 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:11 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x6c, 0x4280) [ 783.963304] print_req_error: I/O error, dev loop4, sector 128 03:35:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x40, 0x200) getsockopt$inet6_dccp_buf(r1, 0x21, 0x0, &(0x7f0000000140)=""/117, &(0x7f00000001c0)=0x75) getsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f00000000c0)=""/34, &(0x7f0000000100)=0x22) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) [ 784.053814] print_req_error: I/O error, dev loop4, sector 128 03:35:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fffffff600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000002000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:11 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0xbf, 0x4280) 03:35:11 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000039e55e1c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r1, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_TYPE={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x4000081) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$SG_GET_SG_TABLESIZE(r2, 0x227f, &(0x7f0000000200)) 03:35:11 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x1000000, 0x4280) [ 784.392632] EXT4-fs: 14 callbacks suppressed [ 784.392645] EXT4-fs (sda1): re-mounted. Opts: 03:35:11 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000001a0000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0d52000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:11 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0xf6ffffff, 0x4280) 03:35:11 executing program 0: r0 = shmget$private(0x0, 0x3000, 0x1104, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f00000002c0)=""/75) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000340)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0xc2, "5ae95dfb4ca90d54d1f2488160ae35b811e572f2144a950164a008bb381c634df56924d238b9a9ac480c94a2f922a4caba2fd7f81c9c14981222bd2bfcee25a87fb46c4c4e15d2e2c4ce56affc25723d92c8afbde659331e9d99357a7d2156860fa79fd33e0a3f49dc817ce6b3f27b2d833f7bedd1944a91d83931ccdff6f798f250ddaf00043bdaa82911bce8773e151303afbb44c41893905dd2dcfee374721fab75c55e52b583933773881f02241210b3f4109406f080ef7a92ee2af64cc6b8a0"}, &(0x7f0000000000)=0xca) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e24, 0x9}}, 0x8, 0x7fffffff}, 0x90) socket$netlink(0x10, 0x3, 0xf) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000380)={r2, 0x1acd, 0x0, 0x8, 0x3ef5}, &(0x7f00000003c0)=0x18) [ 784.696168] EXT4-fs (sda1): re-mounted. Opts: 03:35:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fffffdf900000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 784.790203] EXT4-fs (sda1): re-mounted. Opts: 03:35:11 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:11 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x1f00, 0x4280) 03:35:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00740000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="001f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f00000001c0)={0x1, 0x0, {0x4, 0x12, 0x4, 0x19, 0xa, 0x7fff, 0x5, 0xba}}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f00000000c0)=""/172) [ 785.057419] print_req_error: I/O error, dev loop4, sector 128 03:35:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000f9fdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:12 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) [ 785.132902] EXT4-fs (sda1): re-mounted. Opts: 03:35:12 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x74, 0x4280) [ 785.244415] EXT4-fs (sda1): re-mounted. Opts: 03:35:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x800) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x4e20, 0xffffffffffffffec, @mcast1, 0x9}, {0xa, 0x4e23, 0x80000001, @dev={0xfe, 0x80, [], 0xc}, 0x6}, 0x8, [0x100, 0xffff, 0x4, 0x2, 0x6, 0xffffffff, 0x9, 0x7ce6]}, 0x5c) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00200000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:12 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x48, 0x4280) 03:35:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="6c00000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:12 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x16, r1, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) 03:35:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000007004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:12 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x200000000000000, 0x4280) 03:35:12 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$netlink(r1, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:12 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x400000, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000180)) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 785.637234] EXT4-fs (sda1): re-mounted. Opts: 03:35:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000fffffff40000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 785.707381] EXT4-fs (sda1): re-mounted. Opts: 03:35:12 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x1a0, 0x4280) 03:35:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00#', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000030000009d617570af1956eb7407a90000000000000480d8e1dbc200000000000000000000000000"], 0x1}}, 0x0) 03:35:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000100004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:13 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x600, 0x4280) 03:35:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) r1 = semget$private(0x0, 0x4, 0x38) semop(r1, &(0x7f0000000000)=[{0x5, 0x2, 0x800}, {0x3, 0x101, 0x1000}, {0x7, 0x1, 0x1000}], 0x3) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:13 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x300, 0x4280) 03:35:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000ffffff8c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4, 0xfff, 0x0, 0x4, 0x0, 0x70bd2c, 0x25dfdbfb, [@sadb_x_sa2={0x2, 0x13, 0x0, 0x0, 0x0, 0x70bd2c, 0x3503}]}, 0x20}}, 0xc0) [ 786.178796] EXT4-fs (sda1): re-mounted. Opts: 03:35:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000003004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:13 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x8, 0x4280) 03:35:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00 \x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)={{0x10b, 0x0, 0x0, 0xc6, 0x387, 0x3fff69b4, 0xca, 0x3ff}, "f0e6c028b6fab09faea900af20b5653f28c103f23132f923617abe46b6251ced17f9e157e11c7d83650e521063e28d42608855f1d7b9cadafeed7c78bed03f373cf3b9e5d3190dd8f35351103ab16af96cefc3bf63dc5db4abf8cb3eb55e3f141b470e0c1300de95c68b63c2126a200b77a67141e729b71e296a829a4a38575b", [[], [], [], [], [], []]}, 0x6a0) 03:35:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) [ 786.415637] print_req_error: I/O error, dev loop4, sector 128 03:35:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4400000}, 0x5, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYRESOCT=0x0], 0x1}}, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x140) ioctl$KDDELIO(r1, 0x4b35, 0x4) 03:35:13 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x300000000000000, 0x4280) 03:35:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000fffffff6004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:13 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) [ 786.725750] EXT4-fs (sda1): re-mounted. Opts: 03:35:13 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x100000000000000, 0x4280) [ 786.789396] EXT4-fs (sda1): re-mounted. Opts: 03:35:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) close(r0) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00t', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00060000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000080004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:14 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x5000000, 0x4280) 03:35:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f00000000c0)={{0x6f, @local, 0x4e22, 0x0, 'wrr\x00', 0x4, 0x400, 0xb}, {@remote, 0x4e24, 0x2000, 0x9, 0x8, 0xfffffffffffffffc}}, 0x44) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000140)=ANY=[@ANYBLOB="180000002e00ffff0002000000407407a90000000000080080d8e1dbc2000000000000000043b34dc94a7d830256f87b2044a1000000000000"], 0x1}}, 0x0) 03:35:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000039e55e1c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0002000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:14 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x6800, 0x4280) 03:35:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a05000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:14 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x80) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x18) 03:35:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r1) 03:35:14 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x7, 0x4280) 03:35:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363afcfdffff000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00V', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x1d61ad8d, 0x400000) msgget$private(0x0, 0x401) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x80, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:14 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) [ 787.817215] print_req_error: I/O error, dev loop4, sector 128 03:35:15 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) getsockname(r0, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000140)=0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:15 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x800000000000000, 0x4280) 03:35:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000110000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:15 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0xc764) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff00020000007aa500030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:15 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x2000000, 0x4280) 03:35:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000017", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000007000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000240)={0x0, 0x149}, &(0x7f0000000400)=0x5) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000300)={0x0, 0x8}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e21, 0x6, @mcast1, 0x7ff}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r3, 0x1}, &(0x7f0000000200)=0x8) 03:35:15 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x6c00, 0x4280) 03:35:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000004000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000400004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:15 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x700000000000000, 0x4280) 03:35:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="1800000052e7325fafee4a18030000009d617570af1956eb7407a90000000b00000080d8e1dbc2"], 0x1}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r2 = geteuid() setreuid(r1, r2) 03:35:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00 ', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000040000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 788.624619] print_req_error: I/O error, dev loop4, sector 128 03:35:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup3(r0, r0, 0x80000) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000000)={0x5, 0x6, 0x5, 0x1}) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:15 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0xa0010000, 0x4280) 03:35:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000009004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) [ 788.843352] print_req_error: I/O error, dev loop4, sector 128 03:35:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\\', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[]}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/connector\x00') read$FUSE(r1, &(0x7f0000000100), 0x1000) 03:35:16 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x6c000000, 0x4280) 03:35:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000050000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000002004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:16 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40002, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x2, 0x1ac9f07d}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000140)={r1, 0x3}, 0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendfile(r2, r2, 0x0, 0x10000) sendmsg$nl_generic(r2, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) 03:35:16 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0xf6ffffff00000000, 0x4280) [ 789.214437] print_req_error: I/O error, dev loop4, sector 128 03:35:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:16 executing program 0: r0 = memfd_create(&(0x7f0000000000)='wlan1vmnet1+\x00', 0x0) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x2711, @host}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e40ffcae502000000400000030000009d617570af1956eb7407a900003b7b0fa5eda0e7badbc2"], 0x1}}, 0x0) 03:35:16 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x600000000000000, 0x4280) 03:35:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000001c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 789.448770] EXT4-fs: 10 callbacks suppressed [ 789.448784] EXT4-fs (sda1): re-mounted. Opts: 03:35:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00G', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000020004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000000)=ANY=[]}}, 0x11) 03:35:16 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x7a00, 0x4280) 03:35:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$mice(&(0x7f0000001540)='/dev/input/mice\x00', 0x0, 0x220400) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x50, &(0x7f00000000c0)={0x0, 0x0}}, 0x2) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r2, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f00000001c0)='user\x00', r2}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000440)=0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRDELBR(r5, 0x89a1, &(0x7f0000001580)='vlan0\x00') r6 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x8, 0x400) ioctl$sock_bt_hidp_HIDPCONNADD(r6, 0x400448c8, &(0x7f0000001480)={r0, r6, 0x8, 0x4, &(0x7f0000000480)="d61a877dcaa2ef174c5f91ef841afbb5d77b8e0640bc63042b73c9e071a1fdd5d14807261b13be807d4e3e02c1214a329f3da992e595472131b37b84dc66f189a39bdb87adb4c506bf729a3e42be9de141ae37af326f47a35655a14db0cf41c3b5384b3b342d5629cd067068d48354a2435d0281e8993a0cf94b8544a7df92f51432c9e32676daafbd2f5f1bf6ab7e2dde5bfdbc667bff46e7d0576cdddec40e072cd1105e232862432b67fd80e02906d04fe7564a08913e5e7f632c7d3997b23a244c9f677855c3fbafc077f372590bd90ef76c39396129bac28913ba0bc1fb8e2e437bdc2f4dd139a6340acddea9ed80d867e2c846b176e57ba8bcb5b3c610e571101e4c0483b5df4632fd6bc056b311db7565d6042c67a64ca3509883fdbfd717299a857a08f62e125a774e323b5d6d89ea0c903716abb2337211d77e161900ffce6c6a690aaebee8c849a5f9b890c54c4e347c926c33e2bbb6ea744b958ea804d4ecd6d2b6d8c90565afda8b86ea8151a962bbd24d28e39080e362b759a559e351ce91f515fb179f79652c21c2ece7a8e009297fc622ae838280c3098af8fa47187f2a91609cc63094b84b63da37de28f015fd3655acce8552288b103614d8ed44c67c994d69069f5c91827b2f1e942c0c74c99b2f2f4752f20b3e6e6993aa9105a003257a36077770ac4c5cff416f1a331c122e7fcbe2dc7f02c5bb11156c8520b6b0d07a7857b40cf18a9ba9a70ddb08dcbdf49b3258c2059bed5d12615ca1a297fe6a7d1eca1452834f4c9bb32b0bfdb04e51eef86f95122977e15d7cc99068cfcfb6d8f9e3c7b1aaef42b4db817963000ccdaa0cd5c57be2967c5a8fab4cca19d66baab89374ab3a046f016d0a360a14a839d7e14b92e6d750d76058338978c5767953ca7721934105adeaf9e202763663d81746af932456cb1eaa6587c32f8dbdee86859548c1c43e60eacba731f74bef7234b7f2677e44878d278f702a642442546022b33fed27abe0b27972db6f2d5fb7a547b58ce30471157044505d0f33eaa34bed5ea66ee8b6bd9c47efa84d6b1c036c61075fe44e8b106b076e402b913f3b90c3f649da00e2eec1e26553dc6abe410fd8f7bae08a2b224de4cc597a705513b796e2183af90d4768ec6f530edbd0609438e053270c8e11482ae26f87dae09b23279ea49fe00721cfdd5531723115812dbe748c84665eb652994c9297af058f828a5307c3e6a3ed2f6c6b20b2a11d02d3500537c443bd012ed88433d0908fb13005f4a60a350a8c35cde11d9509fc8d2406fee9326bc01bc7eaf8b06ee0a06e87d52e77dcca4f84af6fb2d6f7ac202a2269414b333510d3ee92d07b1ecd1ea54afebc581758cf0e78a8e1198d1ff7907c43b3332250de05860c5cc3a9002375b2bde62ef11026330158ec306738b2b0c5f970e02731f141b5968f082878fd7c9f32929c1730b265484a2f5e5628c895e85f4949716611180399cfa91959030caa1577544c63055b40e110d9cd440b8542ffe9d424796777db137d75f411014a979cb051ff73698e52b745158c9908606605031ea6659b18373b6375e823018ff98472807d0f01075e5f74556f54a4a0c2db4d59a3b044b54e8b0d0db8b10b9b219d6458ba139059b55ae382e41fe17da9a09b07cf81166708fe5e49ec65bfd58608cdaf9322ad75f749635cb17aad4b7b5c9baa5a7346aa145abc7defce17cae3b5ddec8537a51141f9c9da90c607f5879690a33068303066ab3259de04984a5bf365477528fdc8ff680ed3fa0dd93abb61500b84bd2fd199891b1cbe252739355a4232a46591dc0d5dc8865317eb3133929a10e09fbdd9f4b9749483987d29b89b9e36701d47c39176743fd77910a95360a15b59bd78769f903f200cb7e75772a0a558bcdb3603becabbcbe110146dac9efb94a08b84d495c0f870a7ccd599235d4fdd1e89545dfa9c8e40e0a6651167f13f530aa9314fec2ab8efc5c4675c37a4f38752b1f8aca1bedf1be988129fd302f08c654825d88397ca6a5cc5bb05a547453be7d7a3e6455e30d17a02e6ec94fb945116f2d9000e43dbfa0cb60a30d5ce635e91fd6076167f7b6f1e0dd1ea1ae8eca22f4239d4eac52c9a6a1f7738fb7b3c9ad83af465fe47c9c762db91bd5059dd98b33644c4b2f8187cb39a7b6010ead92dd5d442de414c5f13c8df4f49a376a67568b539806fddd9e65472bd3530f0eab169b0ad3582d6d202b37a29fa6c6ccec1864e22cdcfee391e3ffaeec2663a8e936c7ff179ce8cc1a658bf68ad51e381cd89ae1cec9a4dd2e344de8db39f3e3a12c452f0cc1fc51f4e997061bdf86ca6c0442fa258f7ca46a899e3b20f27df458bb60f057231fc048633d149aa5b21781700b928d3bf1f34d42dead3a93b8454f000ced77790c9ad56046525210ba866eba183efda21a8d418f57c92df71067b126018f9375f83994b4fb057cc0b2228070fd5b3af02248d33212aa8f2887f41a6b6bf9bee2ecd4811b94c9d21d896820c1cefa1fd645c91b62d22b118c51e0971ba61ab3b0d1654c9f761e6f6bcab9533a01b7e5639fec94fe1e0aa32ff81632bad0dc67a7938b769ad5b6744cbc1931a1999e113e1b42fb1064cc584edd1b344e984172235dec2332c1934aa24b74512519b508a02eaa980cb7ff99e08941626321b8a294962d426fb2f10c146394e1bb2822ce585935aa2e716991a5896a316de8bf333ce6b091d22aa8d066fc93a9e492e85a503701c103e1b28bc4a017935f236bde69d7beb15e441577f473619f47b84a36d3888395422d9fe497f5a868475f5e0ea76afe8b4bf5a8efad1b05985bc9268e56218725e0fb70d8e71ffaa7bb80782556de24076bc33c97cf5790ca6efdb981f86f838a4d6745142691dd16ae3c0d5e65b952e0bb8130f4513596f20639361ba7fe81161800292bbc520092631019295d6b46de85cb2cbc51beb23926ee6e1b140a6d32289249363bf085b6c550effdf5baa7c928d980915decb6a667a2e48c91a4d5b75cea8794494fde41ae7937992d762fd715f1bc99c15ae097edb6c9cf90722482898b86440b130ebb8cc60b8afbb58960d1d1010058627582a650158c322088a4917116df440fe5ca61e3aa85431c51675d0a6c97aa0ccce03e30f225734705f2ff372f5f7be8249dd476c51c23358d7d3c48497f6b6251bcbb4174ed7b5bc588298726ab5d9163c1095c10599e2669fa62f596168afe916aa35e0da4274a1b66d608fdc050049690c74c75228e9334f3d0afc965cebcf0973edd39af68f30ad23884bf3804c8f6bd0385dcac13d18346011d7ce9edeee2718fce5b094ba63e78f1304a553445c92d95209d50f7e88b88d6e26466cfa4214785bf60b633cec60a9b53fb1ce33e83c24c7256955e06f1752d7b49f36f02931853665e9b290a1b1df520a4dc81e78dab78ba2e61632be8cf58300fc3001454b0552ad739963eb0a9c59e295fed7396b42ae7c238da1e43cb6624cbb91ab8511ad416fc5ab3eda45e2f5c945d20eb6f2011e6e396cba08975a5e04333b300d9dfc607451d7568dfbbee95d9eef8d5a3cf956a84b1d43bfd97a2d2578d97e14b5853e1b660809ff77ddc25816ac69291f09e1f2c778bd5fb79bafb80f243c193ee59118358bb023887217084615b772547f68cdbd10a678e46d7d1745c431a6152863a0432ddab07643171f663f9d8969e0207e3a1e77fbd9a3c2dd819bcc510282b5ea295c08b72d8f02c069af89ccacf73831dd67f86bf819bcc484c428a3089fb829e0e83ef1d098546a706456fa506386c8fbc066fe8a0d921dcf69b4410b489e6c5327bd06e1151a1763bb395db1a013518dce44df7d983463f873c941a0e570f7463ddbfc5a0b5edc91508e909ff840bb019c0d3c4ca5fdbe665a811834cd6dbb67408e02302f13c344e56c1bc5695c18230d30ec9b18cefa632516e685a2faae6b6d25cd08f18b9a1ab8d8dbbbd4c0e77097ce207447848bd2b678382c0218034afce91d8eab0da4afcda685f78552e2db68e388f64cf6aefffc3bd23d0896b7a473cdfffa7ddfe7cc1fdb6db6aae9683a25937957a69d79871629b4339ec1fbc0aec02d683a339fe282e4365d774a0813128f57f4378b981d557e933f99cad3286c97a68e8164b045d154947441fc83ea1d017251e27023084f537e134c48375db5234e8d9d12387114c5461b5d52737cd1af75934f3c60835dfe4dd60d971fb5cabba48932d7e5312c5b0666680bda4c26acf34f32bffd128179c015d65e2a6e923dbf1b9eaf4b8684d35bcfc06f53d19aff1af8b4300ff3462ab8211717cfb286f83b89f4fb63f93b5f8228331e1e3c0d5262846b3d472cc53de989fc438593af7213036a11ca5ee16c6b394b70516f04048077ecaf41dfe0db448258faa3ba31f6df46e0aa959d8d5678cc93b0e1d4e732a77a28a257c14b3391f2f5c64f7143240a5719ffb325f13f48bd149188747e0e77c918f342c41f9c231cef8f7f93c43517c90c40d1aed4c7d212a76688e3cee47c130c98aa74767769bcd8e240b0c5ce77b66901d663a5d8bd5e33ca8256d5b1fdf2507a93d33d65c7c9d1487bcf8589dd049510a50f0d2aaa450f3e7487ae35b3be45f75caa59d064a51e92ecc38b177d8ba49c3062697bca239c9e5aead590c7cdaebc7eb43ac6dea46d2dc37a8ea0e03012cb93cb2ca3dc583469a59ef66675d3bd57f4d7c27dff68982a655c180aad6de347cf97ba55dde2cab84522a1ebbfb900297724dff9a138a606d892fe0735b08bb0f4264cfca0adde701db1ea1e91f715da0ebbb473db1ac7421c4ff9b53b9805c2bd109926ef65b3dd36e740649952dca5d16a9e296b4bd618db855d9b9c23d6bca3106ba593a86ed26ae8774c2b64c0ba40ceeaa705dba95f0bfcb1cedff9f2f464ca50e32d14a5411c65443e251d53e288ed8d5a0c5b1f2e8b3116021a3825f05d16b874c33f14d95c8e5fdc7e15902e2dfa8ea0694310e266e11f55c43423f53c2dfeee45a5a2a27d09c4fd695ffcc8a480b6e78e166bd3fc100e231e65dfe62d927981e23cf6e1a9952a04342f6c734ef1c97a7aeaf0541f6f5a9befa8aaa3892033c9e3687473778b080b5ae02ce15a50117b6ab340f426d76060075e684cb0fcf73bc861a8fad8739119ffe9e19aa33a51041db8c5ad22a4a925a886f378d3491a369c0f39e57e2aa25c3aa7d64dee824d83afeca93870e55a53670463a603b3d70962b6bb2888e08ade1389d2189c83ebaf27eca3128c9cde56920c0f5657cd256374998c8a33f32e5848079c4ab5affee1d623daf5b2608a4e963f1c07087a2cd51721eda8a30a3f8ecb322b67b47cb2db91b2ce936d20c377a68a5661dd02c261b311aa99c635c59b68d0ccce6ab2a468aa1d87e25242d83bb3d360d22b4a587345c2e1ed29d1c10b156edf73b96bf8414bb38572b12e1e0808ca3f12835b1b74c0892964dbcda40d59359f064ee3f1976e02fa603602a38597ff7c5d44c3ccdb9e07529adffb68282db51ae700ebc2d6df368e6b746614714912b47565d0de2e5d52226a4c190a1ff966dee75096c61a9e353a9e4197344fc91eeea6e4a9d82b6579a4ef5b11d1190d682ddbcbe3ac784208bd94ba86e7bf8f9e39c63fe87f8c5c055dc0c377bb704ea7e61d110c41007e3bdba9da2da96af14eca595a4fd6ed47890011ddf2c424a173e5ee71a7a39820ee39c92d00a5dcb1a2eecf781f2146830084397be46cefdb67449630c7aac73c5c70b5957703a595", 0x4, 0x800, 0x6, 0x2, 0x8, 0x1, 0x2f360fc2, "71e0bb815f8ce100100b9c1e98f86d0d12fc85b7d06b8f45fa2269427d2bdc334dd1363c11a47769fa000ce593c721ddfaab5bf209da4faaee1f868d0d9b487a7a6da512d51738009f6b48a1b68602662f4b58184da641d9a6b4fac7a3096808835faa8212a8b22a4aa28f2ff60049f7f52443dfa66ecbc6bb71d97875b4ddd7c31e75daeb0295074b"}) sendmsg$nl_generic(r0, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40020080}, 0xfffffffffffffeb1, &(0x7f00000003c0)={&(0x7f00000002c0)={0xe8, 0x14, 0x1, 0x70bd28, 0x25dfdbfd, {0x10}, [@nested={0xd4, 0x49, [@typed={0x8, 0x84, @pid=r3}, @typed={0x8, 0x65, @pid=r4}, @generic="f4cfcd5f90c3d78375669db614cd201c529f3ba9b359f4e5b86edbfc434f3509d7f1c6c225b5269f469025af0f0e8cdbb7a8be9b70177f9e20d1b9c37a73fae2d650b7a0f3cb0f0d7cc00ba62ddfe879e259f294ae4045594f47fec55220a712df7acc69bd826e2ae49c7f49c461df85fb72d021c343edd832846c4126c08d9055ebd21cf5de264f45d7c741dd2d56fdf586e2f1e7272934b7d98356424bc77bf63a9fb8f7a896ec40d4debdae2338a2f380748b04d896524f7d11a3d9"]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff00020000004000be69f0f200030000009d617570af1956eb7407a90000000000000080"], 0x1}}, 0x0) 03:35:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080), 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:16 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x4c, 0x4280) [ 789.673850] print_req_error: I/O error, dev loop4, sector 128 03:35:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000008000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 789.795067] EXT4-fs (sda1): re-mounted. Opts: 03:35:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x20000, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000200), 0x4) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f00000000c0)=""/251, &(0x7f0000000000)=0xfb) 03:35:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000003f00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 789.845424] EXT4-fs (sda1): re-mounted. Opts: 03:35:16 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x2, 0x4280) 03:35:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00001f0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000140)=ANY=[@ANYBLOB="180000002e00f7ff0002000000400000030000009d617570af1956eb74078c0000000000000080d8e1dbc2ba4235b4e04566f36c366ef11dd3f704216bfa35f56c8155b372bcb8589748c8671fa87312e1c9095e82a30be141b2820f7eb40d2f67aa584bf91aceac7d72deb4cdd03a8eac53450dc3d1c34a32404ec72ee39f8e925db5c99a99fe"], 0x1}}, 0x0) socketpair(0x2, 0x7, 0xdd32, &(0x7f0000000100)) [ 789.953567] print_req_error: I/O error, dev loop4, sector 128 03:35:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a03000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:17 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0xfffffff6, 0x4280) 03:35:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f0000000280)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7407a90000000000000080d8e1dbc2"], 0x1}}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0xd66, 0xffffffff, 0x1ff, 0x9, 0x2}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={r2, 0x449a, 0x1, [0x4]}, &(0x7f0000000180)=0xa) [ 790.222843] EXT4-fs (sda1): re-mounted. Opts: 03:35:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000edc000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:17 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x7a00000000000000, 0x4280) [ 790.313595] EXT4-fs (sda1): re-mounted. Opts: [ 790.330003] print_req_error: I/O error, dev loop4, sector 128 03:35:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000023c0)=""/49, 0xf}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 03:35:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00Z', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a1c000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:17 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x6000000, 0x4280) 03:35:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000200000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) [ 790.609539] EXT4-fs (sda1): re-mounted. Opts: [ 790.699882] EXT4-fs (sda1): re-mounted. Opts: 03:35:17 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x68, 0x4280) 03:35:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00U', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000feffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000001000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:18 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0xbf00000000000000, 0x4280) [ 791.090549] EXT4-fs (sda1): re-mounted. Opts: [ 791.104274] print_req_error: I/O error, dev loop4, sector 128 [ 791.177970] EXT4-fs (sda1): re-mounted. Opts: [ 791.184726] print_req_error: I/O error, dev loop4, sector 128 03:35:18 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) accept$alg(r1, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:18 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x6800000000000000, 0x4280) 03:35:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000001020004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000740000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00u', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 791.512984] EXT4-fs (sda1): re-mounted. Opts: 03:35:18 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x42c8) 03:35:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0), 0x0, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000600000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:18 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00680000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00a', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:18 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:18 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4263) 03:35:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a001c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0), 0x0, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:19 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x420a) 03:35:19 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000000000e", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000ffffff8c00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0), 0x0, &(0x7f0000000740)=[@rights={0x10}], 0x10}, 0x0) 03:35:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fcfdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:19 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000380)="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", 0x1000, 0xfffffffffffffffb) keyctl$invalidate(0x15, r0) 03:35:19 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)}, 0x0) 03:35:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00007a0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:19 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x200000) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000040)=0xa3bf) 03:35:19 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000700000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000000fff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)}, 0x0) 03:35:19 executing program 5: socketpair(0x11, 0x0, 0x3b1, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000080)={0x5, 0x8, 0x80000000}) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r1 = socket(0x11, 0xf, 0xffffffffffff0000) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'ipddp0\x00'}}) 03:35:19 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$netlink(r2, &(0x7f0000000800)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)=[{&(0x7f00000002c0)={0x10}, 0x10}], 0x1, &(0x7f0000000740)}, 0x0) [ 792.763405] print_req_error: I/O error, dev loop4, sector 128 03:35:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000d520000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:20 executing program 0: mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, 0xffffffffffffffff, 0x0) 03:35:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00004c0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:20 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x379080) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xf435) 03:35:20 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:20 executing program 0: mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, 0xffffffffffffffff, 0x0) 03:35:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000023000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000010200000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:20 executing program 0: mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, 0xffffffffffffffff, 0x0) 03:35:20 executing program 5: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x10400) 03:35:20 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000016", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:20 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:20 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00f9fdffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:20 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:20 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\'', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000006004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:20 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:21 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) socketpair(0x4, 0x1, 0x4, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000001c0)={0x8, 0x120, 0xfa00, {0x4, {0x80000000, 0x1000000000000000, "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", 0x4b, 0x80000001, 0x7, 0x100000001, 0x2, 0x2, 0x1ff, 0x1}, r1}}, 0x128) r2 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@ax25, &(0x7f0000000100)=0x80, 0x80080800) connect$llc(r2, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x7, 0x6, 0x2, @random="4315894c0fa2"}, 0xffffffffffffffc1) 03:35:21 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) 03:35:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a001c5e00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:21 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:21 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4100, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000040)="9b4929c185ac99a63622d066419a4375bb0816d01e095fcc10c078b05d015b780d34a127170b5a1c33c059c220f89ee4073c67e8cc03c1fcf446df8e4226948dff02e057e67eb007b318f4b36a892951449637992422ee53113d1387a89c21602b5788f61945ff66468c9c0287af859a555da814bba4beb05794988e883412ac", &(0x7f00000000c0)=""/234}, 0x18) 03:35:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00000a0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000040004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:21 executing program 1: mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, 0xffffffffffffffff, 0x0) 03:35:21 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000102000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:21 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0xc8c4209fe3111f53) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x804000, &(0x7f00000000c0)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@sq={'sq', 0x3d, 0x1}}, {@common=@access_client='access=client'}, {@timeout={'timeout', 0x3d, 0xee}}, {@common=@access_any='access=any'}, {@rq={'rq', 0x3d, 0x4}}, {@common=@access_client='access=client'}, {@sq={'sq', 0x3d, 0x5}}], [{@permit_directio='permit_directio'}, {@appraise='appraise'}, {@seclabel='seclabel'}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@appraise_type='appraise_type=imasig'}, {@smackfsdef={'smackfsdef', 0x3d, "6b657972696e67736563757269747928dc"}}]}}) 03:35:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000001100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 794.488115] EXT4-fs: 13 callbacks suppressed [ 794.488138] EXT4-fs (sda1): re-mounted. Opts: 03:35:21 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) 03:35:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00J', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:21 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r1 = dup(r0) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000000)=0x4) 03:35:21 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:21 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 03:35:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000fffffff500004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00002010000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:22 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = memfd_create(&(0x7f00000002c0)='\x00', 0x4) r1 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x8, 0x240) sendto(r0, &(0x7f0000000380)="8d9cb72d6217ddd50fc832aa714b4b980f12dde2a551337f03a338533b298ef7dfff7a02cf9bb3b0758c2c2e00f92dc961e0079cdd39be8b2fa40c3abf358b2e69083c36617a8e0f5c59d238839b8fc72e1d68f6eccaea3c500aa5ee2036046638f426c2ea8350593c62", 0x6a, 0x8000, &(0x7f0000000400)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x4, 0x2, 0x0, {0xa, 0x4e21, 0xffff, @mcast2, 0x7fffffff}}}, 0x80) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x142, 0x0) getsockopt$inet_dccp_int(r2, 0x21, 0xf, &(0x7f0000000040), &(0x7f0000000140)=0xfffffffffffffe3d) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000000)={0x0, 0x4}, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000004c0)={0xffffffffffffffff}, 0x117, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000540)={0xa, 0x4, 0xfa00, {r3}}, 0xc) r4 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000180)='/dev/zero\x00', 0xffffffffffffffff) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000480)={0x8, 0x5, 0xfffffffffffffeff, 0x87b, 0x8, 0x3, 0x9, 0x10000, 0x3, 0x100, 0xb9, 0x1f4d}) r5 = add_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$link(0x8, r4, r5) add_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r5) 03:35:22 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) [ 794.922860] EXT4-fs (sda1): re-mounted. Opts: 03:35:22 executing program 1: syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, 0xffffffffffffffff, 0x0) [ 795.025354] EXT4-fs (sda1): re-mounted. Opts: 03:35:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000100000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:22 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000030080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:22 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000000c0)={r2, 0x7}, 0x8) 03:35:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fbffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:22 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback, 0x7f}, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}, r1, 0x400}}, 0x48) [ 795.341765] EXT4-fs (sda1): re-mounted. Opts: 03:35:22 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, r0, 0x0) 03:35:22 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb67027fc3b0e4c3c1739447c16ad795b2c67ed4bc724ac8e93750d8dc04564f80ec0ae34344c4e8eb848fbb38398f788bdb4ba654ca5007e222e136affbb84ac63171c4a1a0809c817239a724903d2728c88cf5b4493fdfb7a945a31921e8b4b6e06fb5d8ad"], 0x67, 0x1) signalfd(r0, &(0x7f00000001c0)={0x1ff}, 0x8) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x10001, 0x4100) getsockopt$inet_dccp_buf(r1, 0x21, 0xd, &(0x7f0000000080)=""/199, &(0x7f0000000180)=0xc7) 03:35:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000001f00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 795.498884] EXT4-fs (sda1): re-mounted. Opts: 03:35:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000004004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:22 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x10, r0, 0x0) 03:35:22 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x82000) 03:35:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000940)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000340), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) accept4(0xffffffffffffff9c, &(0x7f0000000080)=@in={0x2, 0x0, @dev}, &(0x7f0000000200)=0x80, 0x0) 03:35:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00ffe00080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:22 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20013, r0, 0x0) mmap$binder(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0x13, 0xffffffffffffffff, 0x0) 03:35:22 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000080)=0x62, 0x2) r2 = socket$inet(0x2, 0x800, 0x7) fcntl$setpipe(r0, 0x407, 0xfffffffffffffffa) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000100)={0x0, 0x70, 0x79, 0x2f1f0117, 0x200000, 0x8f46, 0x0, 0x5, 0x80, 0x4, 0x40, 0x61, 0x800, 0x4, 0x9c7, 0x1, 0xb4c, 0xbee2, 0x0, 0x0, 0x5, 0x8, 0x10e, 0x17c57bf8, 0x80000000, 0xfff, 0x401, 0x400, 0x5, 0x40, 0xd25e, 0x8, 0x401, 0x2, 0xfffffffffffffff8, 0x1, 0x101, 0x43, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000000c0), 0x5}, 0x2000, 0x20, 0x5, 0x4, 0x3, 0x3f, 0x7}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e21, @loopback}], 0x20) [ 795.803373] print_req_error: I/O error, dev loop4, sector 128 03:35:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00a00100000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 795.851891] overlayfs: failed to resolve './file1': -2 [ 795.898901] EXT4-fs (sda1): re-mounted. Opts: [ 795.971250] EXT4-fs (sda1): re-mounted. Opts: 03:35:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000005004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000940)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000340), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x74, 0x0, 0x200, 0x70bd2b, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ifb0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) accept4(0xffffffffffffff9c, &(0x7f0000000080)=@in={0x2, 0x0, @dev}, &(0x7f0000000200)=0x80, 0x0) [ 795.997634] overlayfs: failed to resolve './file1': -2 03:35:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0003000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000940)) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000340), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) accept4(0xffffffffffffff9c, &(0x7f0000000080)=@in={0x2, 0x0, @dev}, &(0x7f0000000200)=0x80, 0x0) [ 796.104329] print_req_error: I/O error, dev loop4, sector 128 03:35:23 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x4000, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f00000000c0)="45a916a2e4e0ff3e45204b254431b0bc6ba5ef99f3d72d82b98a65d9992d4a"}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e22, @multicast1}, 0x10) r1 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000180)={'HL\x00'}, &(0x7f00000001c0)=0x1e) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000000)={0x6, 0x0, 0x265, {}, 0x5, 0x1}) 03:35:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000d5200000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:23 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r1, &(0x7f0000000940)=[{&(0x7f00000005c0)="b1", 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) read(r0, &(0x7f0000000200)=""/8, 0x8) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) write$eventfd(r0, &(0x7f0000000240), 0x8) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 796.353515] EXT4-fs (sda1): re-mounted. Opts: 03:35:23 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x4280) dup3(r0, r0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x527, 0xa0400) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000240)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000340)='/dev/nullb0\x00', 0x10000, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0xc8) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000200)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x201, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="09000000810001000600ff03d65308000271d70000000000"], &(0x7f0000000300)=0x16) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000040)=0xff) sysfs$1(0x1, &(0x7f0000000280)='eth0([vboxnet1ppp0\x00') 03:35:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000fffffffb004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 796.433849] overlayfs: failed to resolve './file1': -2 [ 796.520046] EXT4-fs (sda1): re-mounted. Opts: 03:35:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x4000) io_setup(0x100, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000200)}]) 03:35:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000230000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000014", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:23 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x101000) 03:35:23 executing program 1: r0 = socket$inet(0x2, 0x803, 0x6) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000200)={@multicast2, @local}, 0xc) 03:35:23 executing program 5: 03:35:23 executing program 0: clone(0x100002102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r3, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000140)={'gre0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1c}}}) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000480)=""/196) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1e2209e924c5de39, 0x0) write$eventfd(r4, &(0x7f0000000400), 0xfffffffffffffef3) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000002c0)=ANY=[], 0x0) 03:35:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000400)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000140)}], 0x1}, 0x0) 03:35:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000006c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 796.907744] EXT4-fs (sda1): re-mounted. Opts: 03:35:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000004000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:24 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x81c0, 0x0) write$9p(r0, &(0x7f0000000100)="8ef6db064b7874d130d5b2a738ec25be5271716ae4754fcede6cff852e3e087c8e635e78ee9f82b7fc08416bfcb291c9646a315c9da74c7431fe48bf2d39e180ce9d16702b6c08e6da8aeecd46aa46cacf5bd461bd9556b1c0e3408e712505f1d4b05acaa2fcfa1095712cddcc42ff07293b8d0b4bf57ac3d66ede767b2e9087c8583988b682e9a188692fb7ebc3ca565cb00ea1ae26afde51ae05a9", 0x9c) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00C', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f0000000400)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000140)}], 0x1}, 0x0) 03:35:24 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x3e) poll(&(0x7f0000000000)=[{r0, 0x10}, {r0, 0x4410}, {r0, 0x42}, {r0, 0x42}, {r0, 0x1100}, {r0}, {r0, 0x300}, {r0, 0x200}, {r0, 0x80}, {r0, 0x1240}], 0xa, 0x70c9) 03:35:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00001001000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:24 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r1, 0x0, 0x6, &(0x7f00006ed000), &(0x7f0000000000)=0x2) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r2 = open(&(0x7f0000000000)='./file1\x00', 0x240440, 0xc6) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) fstat(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x1080, &(0x7f0000000140)={[{@index_off='index=off'}, {@index_off='index=off'}, {@index_off='index=off'}, {@xino_auto='xino=auto'}, {@nfs_export_off='nfs_export=off'}, {@xino_off='xino=off'}], [{@fsuuid={'fsuuid', 0x3d, {[0x3f, 0x0, 0x76, 0x32, 0x77, 0x33, 0x75, 0x67], 0x2d, [0x37, 0x0, 0x30, 0x63], 0x2d, [0x0, 0x67, 0x7d], 0x2d, [0x30, 0x67, 0x32, 0x39], 0x2d, [0x38, 0x77, 0x31, 0x65, 0x30, 0x33, 0x31, 0x76]}}}, {@euid_lt={'euid<', r3}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@subj_role={'subj_role'}}]}) 03:35:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00%', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:24 executing program 0: r0 = socket(0x10, 0x80002, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000580)={0xb}, 0xb) bind$netlink(0xffffffffffffffff, &(0x7f0000177ff4), 0xfffffffffffffddd) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000540)) accept(0xffffffffffffffff, 0x0, &(0x7f0000000200)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='memory.current\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000440), &(0x7f0000000480)=0x8) socket(0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000002c0)=""/205, &(0x7f00000003c0)=0xcd) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000400)={'tunl0\x00', {0x2, 0x0, @multicast1}}) 03:35:24 executing program 1: socket$kcm(0xa, 0x6, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000440)="63707526350a0a0a0000010000039cd30e35cca01d3d0b0a1c60666f8dcc6d5c76fd2e9e09626b31deea1b0d3b8184872d58b62cc5b4223726b5797482fb1d83e6f82e2d6d0af3b128e9604401695c8d6c866c68a8fc80de2c4b74f41ac55d593b0906be2aaa26bd16785186f3d61afdd00427799b7ce4b70845ed9780731957b75bf0253e4d4df598be5e3d7121a60f70013200bbbe9d7235af657010520b26afa8247f3756ed4c4a34cf9040d5540acac2865fc1ce8ded62538de97482f4317a7772e66f88e5e3e7476378c091498dfde4bb73bf0a004b9ee55ba00a0f04a6b07345298ad052c3c12c62201c2349527a36fe4a7edad75fbe1fe586b178000000000000000093ab05") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x0, 0x3, 0x0, 0x7, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000240)='GPL\x00', 0xf4, 0x47, &(0x7f0000000280)=""/71, 0x41f00, 0xe7db288e1ffb0d80, [], 0x0, 0xf}, 0x48) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x24, &(0x7f00000001c0)=r1, 0x4) r2 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000740)=@ipx={0x4, 0x0, 0x10001, "8318cfdbc3b2", 0x400}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000a00)=ANY=[], 0x0, 0x20004010}, 0x4000) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000040), 0x52d) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000003c0)=@generic={0xc, "ddf95228adcb80d455a64ea96b388c597669d14253d4c01472089f2cfd33ee18601957bc7a0ee267debd46825d7baa4d9ff4e47649ba1ba27857ff311486d58cb08b2eb1bed032bbb59941c2626fde700c63a1aa80847916e8d614a8e84b706c2aff16592e209b8b80a7e685e9f9d3aaa59d695e36cb12585ccbda1b29d8"}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600), 0x0, 0x8001}, 0x20048014) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}, 0x100}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000bc0)=ANY=[]}, 0x0) getpid() recvmsg(0xffffffffffffffff, &(0x7f00000010c0)={&(0x7f0000000f00)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000f80), 0x0, &(0x7f0000000fc0)=""/230, 0xe6}, 0x40000102) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000001100)=r3) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000006c0)={r2}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000700)) socket$kcm(0xa, 0x0, 0x11) r4 = getpid() perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0x0, 0xbca7, 0x7, 0x0, 0x0, 0x7fffffff, 0x200, 0x5, 0x2, 0x3, 0x1c00, 0x0, 0x2000001c00, 0x1, 0x0, 0x0, 0xd9b4, 0xc2, 0x101, 0x0, 0x0, 0xfc, 0x20, 0x180000000000000, 0x0, 0x7, 0x7000000000000000, 0x4, 0xe7, 0x3, 0x2, 0x0, 0x7fff, 0xffffffff, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000380), 0x8}, 0x0, 0x1, 0x9, 0x0, 0x0, 0xab, 0x4}, 0x0, 0x9, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0xd, 0x6, 0x8, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000980)={'syzkaller0\x00'}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000040)="6c6f00966fd651b959a9644a2c00d2970403dc0d") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000003c0)=r4, 0x12) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000680)="6c6f00966f380f64a1e3d75d627d1fa159ad34909d60d298000000202759175d1563ca52dd984f43891be784e2058077d27c448d4b144278cb7548c2ee63bf3c3e591afc1f394f4281891836c571406eb4b673b00000000000080000daefec45ecd549b29bfe8d903f00e9e47e673ac1b2616a96bba7e2c0dcf95108eb167f5411d30d37e62266cf8eab640f747082aed2158e2b63f6bfe1343ea62da563ded7abea1ff873329c5646d518fe0e8f20010000792efc2a82a5a17035c87bf7efabe899eb77238a741c80fcb095a2a7d72c595d45388358f546dc882df5b0b55edb1ab6aa14e2b90d685e4a2dd1ba556e04276c1be06fdbc891251cb5bfb690b4c27f5d2fb3e7c92794cf496fdf0495b506841f483edac504209488eb27d43b367fd9992d1b7c478dd4b925aa51a04b100393e1cce76d8027f0a5ed280da80f26b1f3ff300c82255f928b44b9d9e7f2e4c16923dc8741b9c70d92fa1111b51f039ddd1b6adfac67e3a053d38ae16e97eaf5a0270be9a0f12066aa6ecfb569b664bc920bd5381608b35f3aa4210a79c4260a574d4da8c40b9f016ff4ab26b6170250c3214ea18622d704f1c021edffee24c8398c4230d16444e0495088a2f2599a662424f18196f750acca803a21b49423cb5e9f2703e393b982bfcfc4e3f7034f68f272ca8f66bb2f9f2aaf1a20a5a03f254da58698fa342731c70c3ccc40e88aac2edee4c7f59c6ba43021e91424b3056db56ded0c7493d8a3802759b905bb747cbebc7a0af3f570f89f7e1bd00b1c51") 03:35:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000edc00000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:24 executing program 5: 03:35:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00008cffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:25 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000000)={{0x6, 0x4}, {0x9, 0x8}, 0x8000, 0x1, 0x6}) 03:35:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) [ 798.048577] print_req_error: I/O error, dev loop4, sector 128 03:35:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00K', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:25 executing program 5: sysfs$2(0x2, 0x0, &(0x7f0000000000)=""/139) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x4, 0x282000) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000100)={[{0xcf, 0x9, 0x7ff, 0x200, 0x1ff, 0x8d, 0x2, 0x7ff, 0x8, 0x6, 0x81, 0x2}, {0x0, 0x2, 0x7ff, 0x4, 0xff, 0x27e4, 0x4, 0xff, 0x8001, 0x101, 0x7f, 0x9}, {0x7, 0x2, 0xffffffff, 0x9, 0xdcea, 0x5, 0x0, 0x5, 0x1, 0x4, 0x7, 0xbec, 0x180000000}], 0x81}) 03:35:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) 03:35:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000fffffdfc004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:25 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xff, 0x222700) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) socket$pppoe(0x18, 0x1, 0x0) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000040)={[{0x0, 0x1, 0x6, 0x1200000000, 0x480c, 0x7, 0x2, 0x1, 0x17d4d17f, 0x100, 0x1, 0x1ff, 0x3}, {0x3, 0xfffffffffffffe01, 0x80000000, 0x2, 0x3, 0x7fffffff, 0x611c, 0x7ff, 0x0, 0x7fff, 0x8, 0x9, 0x7}, {0x10001, 0x0, 0x7f, 0xfffffffffffff001, 0x1f, 0x7, 0x4, 0x0, 0x8, 0x976, 0x2, 0xffffffff, 0xffffffffffffffb8}], 0x9}) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00201000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 798.576118] print_req_error: I/O error, dev loop4, sector 128 03:35:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$dupfd(r0, 0x0, r0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) shutdown(r2, 0x0) 03:35:26 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = semget(0x3, 0x3, 0x0) semctl$SETVAL(r0, 0x1, 0x10, &(0x7f0000000100)=0x1000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000000040)=[0x3, 0x800, 0xfffffffffffffffb, 0x6, 0x100, 0x5, 0x100000000], 0x7, 0x15, 0x6, 0x42a, 0x3, 0xfc, {0x9, 0xfffffffffffffffb, 0x2, 0x2, 0x0, 0x0, 0xf, 0x1, 0x2cc, 0x0, 0xfffffffffffffffa, 0x1, 0xc2, 0xffffffff, "7f10bf62d38f21e7ddfa23c0ba47a73853d6d07b4d77f2587b0b4767b19a9394"}}) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000140)=""/215) 03:35:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00O', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000011000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000007a00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) 03:35:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00007fffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) 03:35:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000000)={0x9, 0x9, 0xb44, 0x2, 0x1, 0x1000}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x7f, 0x0, 0x0, 'queue1\x00', 0x4}) getitimer(0x1, &(0x7f0000000140)) 03:35:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000080)="b805000000b9966b00000f01c19a00000080df0066baf80cb867d3748cef66bafc0cecb9c10000000f32660f3882600566b8fb000f00d06466650f233a0f01f6b805000000b9d800c0fe0f01c166b8e3000f00d0", 0x54}], 0x1, 0x4c, &(0x7f0000000000), 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:35:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000050000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00-', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) 03:35:26 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) eventfd2(0x9, 0x0) accept4$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) 03:35:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000040000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) [ 799.517469] EXT4-fs: 9 callbacks suppressed [ 799.517480] EXT4-fs (sda1): re-mounted. Opts: 03:35:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000004c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:26 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) fallocate(r0, 0x20, 0xba48, 0x1) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x8000) [ 799.660452] EXT4-fs (sda1): re-mounted. Opts: 03:35:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00s', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:26 executing program 5: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffc) 03:35:26 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000140)={0x0, 0x80}) 03:35:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000fffffdfd004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) [ 799.966630] EXT4-fs (sda1): re-mounted. Opts: 03:35:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000c0ed000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:27 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000540)='/dev/input/mice\x00', 0x0, 0x500) getsockname$unix(r0, &(0x7f0000000580), &(0x7f0000000600)=0x6e) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000200)='./file0\x00', r1, r2) r3 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r4 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xfffffffffffff25d, 0x10000) r5 = getuid() mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x8000, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_uid={'access', 0x3d, r5}}], [{@appraise_type='appraise_type=imasig'}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x67, 0x35, 0x31, 0x36, 0x7d, 0x0, 0x32], 0x2d, [0x0, 0x7f, 0x61, 0x63], 0x2d, [0x64, 0x76, 0x77, 0x3b], 0x2d, [0x7f, 0x36, 0x61, 0x7d], 0x2d, [0x39, 0x34, 0x0, 0x62, 0x3b, 0x62, 0x63, 0x62]}}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@smackfsroot={'smackfsroot'}}, {@subj_type={'subj_type', 0x3d, '/dev/snd/seq\x00'}}, {@dont_measure='dont_measure'}, {@obj_role={'obj_role', 0x3d, '/dev/snd/seq\x00'}}, {@appraise_type='appraise_type=imasig'}]}}) 03:35:27 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000380)="0a5c2d023c126285718070") r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43ace22", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) [ 800.062711] EXT4-fs (sda1): re-mounted. Opts: 03:35:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000f4ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) 03:35:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000000001f", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:27 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000380)="0a5c2d023c126285718070") r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43ace22", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:27 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r0}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) 03:35:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000002000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:27 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4280) socketpair(0x9, 0xe, 0x101, &(0x7f0000000040)={0xffffffffffffffff}) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) 03:35:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000001004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 800.387877] EXT4-fs (sda1): re-mounted. Opts: 03:35:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) [ 800.485169] EXT4-fs (sda1): re-mounted. Opts: 03:35:27 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000380)="0a5c2d023c126285718070") r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43ace22", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:27 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x103400, 0x0) connect$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0xe1af2ef9371420e7}, 0x10) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0010000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) [ 800.713263] print_req_error: I/O error, dev loop4, sector 128 03:35:27 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000000)={0x9522, 0x4e64, 0x57, {}, 0x84, 0x1}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f00000000c0)) 03:35:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a007fffffffffffffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 800.778177] EXT4-fs (sda1): re-mounted. Opts: 03:35:27 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000380)="0a5c2d023c126285718070") r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43ace22", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) [ 800.842416] EXT4-fs (sda1): re-mounted. Opts: 03:35:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) 03:35:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fffffff500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000050080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:28 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:28 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000380)="0a5c2d023c126285718070") sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43ace22", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00ffffff8c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) 03:35:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fffffdfd00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 801.205527] EXT4-fs (sda1): re-mounted. Opts: 03:35:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) 03:35:28 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x40) 03:35:28 executing program 1: socket$inet6(0xa, 0x803, 0x3) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43ace22", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) [ 801.312703] EXT4-fs (sda1): re-mounted. Opts: 03:35:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00002300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="006c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:28 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xc31e000000000, 0x2080) setsockopt$inet6_dccp_buf(r1, 0x21, 0x8f, &(0x7f0000000040)="b55a09a4947ef7789c05a64b0dd981e96734a4c20e46f0b3e704ee4578fe5cbe57c55538e6484842b24fe115d95a8060700abc67323ffc5daaf4d316251615047d8bd161744e67c1486f7ed128ec066839cab377e6c09c182a167219455f512236180d1e24dbc9779b941befd98e1388624318f879bd678de8c05251658703202be103a5ad578acd8b3f67fae3a73eecbd6c28b0612d372c7308b2c1acd3f95c06", 0xa1) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000100)={0xf5f, 0x36, "c5f34cd5889cb0efa2b90d823910077a31408c8f4bc992caffe9f3da5c1dfab1642782374f360964b5729d7c4e896818284fe10d1b6c"}) r2 = shmget$private(0x0, 0x3000, 0x800, &(0x7f0000ffa000/0x3000)=nil) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) r4 = getegid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000380)=0x0) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)={0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, r1, 0x0, 0xd, &(0x7f0000000400)='/dev/snd/seq\x00', 0xffffffffffffffff}, 0x30) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000480)={{0x6, r3, r4, r5, r6, 0x8, 0x7ff}, 0x9, 0x6, 0x7fffffff, 0x1ff, r7, r8, 0x1}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000140)) 03:35:28 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43ace22", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) 03:35:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000500000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:28 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x0, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) 03:35:28 executing program 1: r0 = socket$inet6(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43ace22", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000000000f", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00001c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x101000) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000001c0)=r2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{0x0, 0x7f}, {0x5, 0x66}, 0x7, 0x0, 0x10000}) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:29 executing program 1: socket$inet6(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43ace22", 0x55}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00'}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) 03:35:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00007a00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00'}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) 03:35:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000100)}, 0x0) 03:35:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00b', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 802.174541] print_req_error: I/O error, dev loop4, sector 128 03:35:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:29 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) lsetxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "d4d9e1a91eeca447f643281dfefb8c76"}, 0x11, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x1) listen(r0, 0x100000000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f00000000c0)={r1, 0x3}) 03:35:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a008cffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00'}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) 03:35:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000100)}, 0x0) 03:35:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x2, 0x3, 0x401}) 03:35:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000007ffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x2c, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}]}, 0x2c}}, 0x0) [ 802.529701] print_req_error: I/O error, dev loop4, sector 128 03:35:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000100)}, 0x0) 03:35:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000015", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:29 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x4280) r1 = dup2(r0, r0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x2, 0x60381) socket$packet(0x11, 0x2, 0x300) ioctl$int_out(r0, 0x2, &(0x7f0000000140)) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100), 0x10) 03:35:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000007ffffffffffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x2c, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}]}, 0x2c}}, 0x0) 03:35:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00D', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 802.914174] print_req_error: I/O error, dev loop4, sector 128 03:35:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000900000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:30 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) socket$can_bcm(0x1d, 0x2, 0x2) 03:35:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x2c, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}]}, 0x2c}}, 0x0) 03:35:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000fffffff600004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:30 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x80000000, 0x0, 0x10003, 0x1}) r2 = getpgrp(0xffffffffffffffff) sched_setaffinity(r2, 0x8, &(0x7f00000000c0)=0x7) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000080)={0x6, r1}) 03:35:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)}], 0x1, &(0x7f0000000100)}, 0x0) [ 803.263159] QAT: Invalid ioctl 03:35:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000c0ed000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x20, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x20}}, 0x0) 03:35:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00e', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4a", 0x2b}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:30 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x80000001, 0x2) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x7) r2 = dup3(r1, r0, 0x80000) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000200)={0x5, 0x0, 0x81f5c39898e9ae5e, 0x6}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000240)={r3, 0xd1}) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)=@gettaction={0xf8, 0x32, 0x8, 0x70bd2d, 0x25dfdbfc, {0x0, 0xaa, 0x3f}, [@action_gd=@TCA_ACT_TAB={0x8c, 0x1, [{0x10, 0x12, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}, {0x10, 0x7, @TCA_ACT_INDEX={0x8, 0x3, 0x21e8}}, {0x14, 0xf, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}, {0x10, 0x10, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x1f}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x10, 0x18, @TCA_ACT_INDEX={0x8}}, {0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x3ff}}]}, @action_gd=@TCA_ACT_TAB={0x3c, 0x1, [{0x14, 0x5, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x5}, @action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x8, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000084}, 0x1) 03:35:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000fffffdf900004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:30 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001e40)='/dev/urandom\x00', 0x82, 0x0) r1 = dup(r0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0xee72) sendfile(r1, r2, &(0x7f0000000080), 0x8000fffffffe) 03:35:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4a", 0x2b}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:30 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x100000001, 0x7a88, 0x1, 'queue0\x00', 0x80}) [ 803.673577] print_req_error: I/O error, dev loop4, sector 128 03:35:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00001020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$tun(r1, &(0x7f0000000240)={@val, @void, @llc={@llc={0x0, 0x0, 'c', "e63486928341814cf5b2b838048592c1f1e112aaa633f3a2f350e2f34d8bd084a78068803319cf3a91cd9345cf1b3a167654fe8b46c26b43304d942102e0af984da25cbbf12d80c772d8122df94a4d1469c41e485f4ce0c91d39fb03085c0774e4277d5854c5f9832e868bb1e07a57f28bdc94a520104d232daf70e751b9d49cd7f19c6042adbf49589dbbe05cafc5c9da9f2ce690df8bfb5d150ad923dd52ac2be6a51cd2fd366e91d814ff4740a25ba76ab73080c7549866c67fd5a165bfdba390daa7bb83ff98b1b13b587786b267e424430cfc56be339669af42c2ad9dee68b4f638f93940b7872fc9ae9da35c694105ff390b63d2697b9572e3c076da8865a461b1f2d56db89e1203bcce96661f135821e9abf9c7590838c34a031a43baa73813eb0f55ae9fa3813151ddd4ff3f31d178156a910526517fcc5b1d0ca9370c2ddbcce30d661cd99c7cd7bcfad5078532ea179b28042f22b84f9e889ae10e0dbc364971e19661fbdc1f932310f01bd1cc7bf184663baefd57026373b9d0baa5fabc2bb5d16a12b02260f320bf6d4ecedd0aa338ae5899acafc7dc79a432f97f22f07aa45cdc5d6c904eefe5da3b4e4ba37d680beb14a2f4a5fd72666a3a4d79b7328b20351a227fcb7b6f6df33e5e3f282e0b01cb6403e9e082ec799eeeb52a0cdafe3f36b9707a9a45cb14ff2bd2489a5ce007c6c47e7d3d7c93db6c4170f26621158694860d54bd222ba0039bd9dda63053eb1f4d18c84e010b796740850d38a46ce5a7b9905baac4c95a3737799abc83be7afe99f8b863098855924ccef45447162df996e094a423fbce2cdda063923c8ce3d18de73d6d1bdf96b7d0bb3b0bc46e581d74f9e2dbf153241b5cd2f01f66dc7d64848ab1ded06d1ff495979b394caf0b53a1cd7b919dd17fadd0470ea38503ee21159a5f444362d4d058bbf02a98fcd1b975cb71bfddc026c7b99cbd9e6a50c78425f9966893574ced4e1f75c8fbd12e056e42298056deedbd5cc62a0d5c529b6e5847d1efb3cd2941901650db8970b9c115bca1a4c1de9b3e67c95456f36adeca321785847469a967ac56b8edb62edd3e345656913cc4d37dc8e8dba996a1dddb2dedd4d493c49060df3f6ab84decd7ebb7ffc904a778922cce24aa5145a1c2a3da4ffa0bed8776f726a02d90f47df7bab620278211a62bb2fc8dd3f48e527a006211760788e371a8b54344c4442e61518a2bfa4129e976fcd6e3145df56f681f767d32a525f46d68d5030a040b75322b04280be330ad421f33c669134fb740107af24c48ecbbde29e5dc75ea706910543dee36dc1c005ca9d7ddeddb423424d5e89783c05d665b07d6c658f4e7dc325ee621d6b6fbb6673c0820ecf0ba7f386ab36c9a2ce4ca97be7702c0e63912240580096931e3d38d978f5ff35a7ec11f115ac16c68813b83ce37e7eb45d197c7ba279fa7d4745a43e4b5f7f93556c119f2e129fb5404a22e0eca429f0d35b7d7f8fdacb9504301b8cfbf1e6898c44fb83beea0df4cf1201780e1f831844f85d87c1454ea3fd70287a1ca6e3a8a71fc43bc38335ea415ec136d22eff3f50a14e7010eb7cf993228e70c8293e97517304daf69537a"}}}, 0x480) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffe8f, 0x0, &(0x7f0000893ff0), 0x10) 03:35:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000d520080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00006c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4a", 0x2b}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:31 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x1, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000040)) 03:35:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00002300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00ffffffffffffffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136e", 0x40}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:31 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x4, @time={r1, r2+30000000}, 0x6, {0xbd8, 0x401}, 0x100000001, 0x0, 0x168a}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000100)={0x8, 0x9, 0x5, {r3, r4+30000000}, 0x5, 0x7f}) 03:35:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000001", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00001c5ee53900000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:31 executing program 5: 03:35:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000), 0x4) 03:35:31 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136e", 0x40}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:31 executing program 5: syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) 03:35:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00ffffffffa001000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00"', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000ffffffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:31 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)={{0x7a0, 0x6}, {0x7fff, 0x3}, 0x200, 0x5, 0x1}) 03:35:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000004000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136e", 0x40}], 0x1, &(0x7f0000000100)}, 0x0) [ 804.992440] EXT4-fs: 15 callbacks suppressed [ 804.992452] EXT4-fs (sda1): re-mounted. Opts: 03:35:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000007fffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:32 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x480) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x4200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000340)={0xf, 0x8, 0xfa00, {r2, 0xf}}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x90801, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f00000001c0)=0x8, 0x4) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000140)={0x10, @tick=0x3, 0x647, {0x6a9, 0x1000}, 0x5030, 0x1, 0x7fff}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc058534f, &(0x7f0000000200)={{0x3, 0x5c}, 0x1, 0x0, 0xfffffffffffffeff, {0x96, 0x800}, 0xfffffffffffffff7, 0x1}) r4 = open(&(0x7f0000000080)='./file0\x00', 0x40200, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_LOCK(r4, 0x4008642a, &(0x7f0000000100)={r5, 0x11}) [ 805.087062] EXT4-fs (sda1): re-mounted. Opts: 03:35:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d", 0x4b}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = gettid() sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f0000000040)=ANY=[@ANYBLOB="0000b2275c81cc0015b47248ee98f201000000e2b7efd0000a00"], 0x1}}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r3 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r3) tkill(r2, 0x0) 03:35:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\r', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:32 executing program 5: syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x427f) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='environ\x00') getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000040)=0x8, &(0x7f0000000080)=0x2) 03:35:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00006800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:32 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d", 0x4b}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000200000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:33 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d", 0x4b}], 0x1, &(0x7f0000000100)}, 0x0) [ 805.940874] EXT4-fs (sda1): re-mounted. Opts: 03:35:33 executing program 5: socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000200)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0xb4, &(0x7f0000000240)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x21}}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e22, 0x1f, @empty, 0xc82}, @in6={0xa, 0x4e23, 0x3, @remote, 0x200}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e20, 0x80000000, @empty, 0x9}]}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000003c0)={r1, 0x8}, &(0x7f0000000400)=0x8) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x280) [ 806.079978] EXT4-fs (sda1): re-mounted. Opts: 03:35:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000005000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00090000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:33 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c553", 0x50}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00{', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 806.545255] EXT4-fs (sda1): re-mounted. Opts: [ 806.600455] EXT4-fs (sda1): re-mounted. Opts: 03:35:34 executing program 0: r0 = inotify_init1(0x0) pipe(&(0x7f00000003c0)) read(0xffffffffffffffff, &(0x7f0000000000)=""/250, 0x128b9372) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"79616d300001178b00", 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={&(0x7f0000000040)}) 03:35:34 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$RTC_PIE_OFF(r1, 0x7006) 03:35:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c553", 0x50}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000006000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000740000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00~', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c553", 0x50}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:34 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4000000004280) r0 = memfd_create(&(0x7f0000000000)='posix_acl_access\\.loeth0\x00', 0x6) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) [ 807.049238] EXT4-fs (sda1): re-mounted. Opts: 03:35:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000fff00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000f5ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 807.181042] EXT4-fs (sda1): re-mounted. Opts: 03:35:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x004', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43a", 0x53}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$tun(r1, &(0x7f0000000240)={@val, @void, @llc={@llc={0x0, 0x0, 'c', "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"}}}, 0x480) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffe8f, 0x0, &(0x7f0000893ff0), 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)="6c6f0000000000000000000000000200", 0x10) 03:35:34 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80801, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000040)={0x2bc9f31f, 0x3, 0x0, 'queue0\x00', 0x7ab9}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x20200) socketpair$inet6(0xa, 0x5, 0x6, &(0x7f0000000100)) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$update(0x2, r1, &(0x7f0000000200)="73a2eee44b4f6b546c906581835d391a28936dc3ff201ee1b1138d638c5125b15d2a04f8e3065d645c763a5efbf87f381a24cf6c587ad5e13b38e1ada5d62fe81af409ba91b40213c3a2ac7c1a71d7f07ecb3c33ac977cb2c53628a3b862f21b49c42b8367fe6ab71977cae26288ff55c881fd69c0b5b3ac8485a2d1ade08015c2c444c7fc6a40a7c2b5672f5aa560fb6bc3498ab4578cc632", 0x99) 03:35:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00004000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43a", 0x53}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000003f000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 807.538750] EXT4-fs (sda1): re-mounted. Opts: [ 807.619849] EXT4-fs (sda1): re-mounted. Opts: 03:35:34 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{0x10001, 0x8}, 0x0, 0xdb, 0x1fb1, {0x6, 0x7}, 0xc8feaaa, 0x9}) 03:35:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00g', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 807.731931] print_req_error: I/O error, dev loop4, sector 128 03:35:34 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43a", 0x53}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000fffffffb00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000102000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43ace", 0x54}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:35 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x30000, 0x0) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x3053, 0x40) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000040)=""/53) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) [ 808.144916] print_req_error: I/O error, dev loop4, sector 128 03:35:35 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$tun(r1, &(0x7f0000000240)={@val, @void, @llc={@llc={0x0, 0x0, 'c', "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"}}}, 0x480) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffe8f, 0x0, &(0x7f0000893ff0), 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)="6c6f0000000000000000000000000200", 0x10) 03:35:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00q', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43ace", 0x54}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000ffffffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:35 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x88000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x8, 0x30}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e21}}}, &(0x7f0000000280)=0x84) connect(r0, &(0x7f00000000c0)=@sco={0x1f, {0x59, 0xa0, 0x1400000000000, 0x7fffffff, 0x100000000, 0xfff}}, 0x80) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$LOOP_SET_FD(r0, 0x4c00, r2) syz_open_dev$sndseq(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0, 0x60801) open_by_handle_at(r0, &(0x7f0000000500)={0xf9, 0x7, "9ee589b336d6da0456ad700de7e62c6251b321458c4068957ad0cd33ddc3de1555077dcbf7ab637fd625c3f83a48a48e28a663c89ce10218cd1d195ce1b60a7e3f94c2584164feda0883e2f1614511a16c7e7806804b00ae4a3c503de7e03d6fd655bbe1085662e251a60b04faeff9ec0ef498fc0bbd6d1f6cdd1da64ec2f47fd1489aee8272af3c8e516e16b4c2ada06ecbda8ca3189acea4bcc98caeb6dcfa9d969d6582c7f1b6d5fe582d178625cba6a852982c261e4bfcd1fff4755e7ad2307487c71e25c99f19ed8acd9bbd8266226e50e7ad99918183f5da9da437b3cd95a28f3cb50e9a9c478b41434bacb704ce"}, 0x400000) write$sndseq(r0, &(0x7f0000000380)=[{0x4, 0x3f, 0x5, 0xffffffffffffffff, @time, {0x5, 0x5}, {0x8, 0x7fff}, @ext={0x74, &(0x7f00000002c0)="f360e59219c5baad2bb21ca35e733032d82808175e80f04b1a3466fd9330a9aab90ce2ad2684ca241544f6021173aaed584645cd6dde9969ef6c155fc8518cd199cf7b0adb800d599b37a145c50aa9fe524330b2b73fa0557bcb8e71ed9f718642ee49317ce1722092c97ae1453587130a47948e"}}, {0xea, 0x7fffffff, 0x6, 0x2, @time={0x0, 0x1c9c380}, {0xfff, 0xd9}, {0x6, 0xffffffffffffffff}, @raw32={[0x7, 0xeab7, 0x9]}}, {0x6, 0x6, 0x9, 0x2, @tick=0x26cf, {0x2000000000000, 0x79b}, {0x3, 0x1}, @control={0x2, 0x7, 0x7}}, {0x0, 0x2, 0x0, 0x6a8d, @tick=0xa47, {0x4, 0x6}, {0x100, 0x9}, @raw32={[0xf470, 0x0, 0x81]}}, {0xbe, 0x1, 0xffffffff, 0x4, @tick, {0x8, 0x3}, {0x100}, @quote={{0xff}, 0x8000, &(0x7f0000000340)={0x7, 0x3aef, 0x8, 0x101, @time={0x77359400}, {0x401, 0x3}, {0xfffffffffffffff8, 0x7}, @quote={{0x800, 0xf6a}, 0x6}}}}], 0xf0) signalfd(r2, &(0x7f0000000040)={0x7}, 0x8) 03:35:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000900000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:35 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000180)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000d00)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008000a00110000dc13389d0d4ac5b824666ac5925e980bf54d85d54400009b84136ef75afb83de448daa72540d816ed2c55327c43ace", 0x54}], 0x1, &(0x7f0000000100)}, 0x0) 03:35:35 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) [ 808.773806] print_req_error: I/O error, dev loop4, sector 128 03:35:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000013", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000231f7dc339e55e1c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:36 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1ff, 0x541082) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000040)=0x4000000) 03:35:36 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$tun(r1, &(0x7f0000000240)={@val, @void, @llc={@llc={0x0, 0x0, 'c', "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"}}}, 0x480) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffe8f, 0x0, &(0x7f0000893ff0), 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)="6c6f0000000000000000000000000200", 0x10) 03:35:36 executing program 0: 03:35:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000040000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:36 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x40000000004283) 03:35:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000fffffe00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000019", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:36 executing program 5: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x400000) 03:35:36 executing program 0: 03:35:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000fffffff5004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000010000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:37 executing program 0: 03:35:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00,', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$tun(r1, &(0x7f0000000240)={@val, @void, @llc={@llc={0x0, 0x0, 'c', "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"}}}, 0x480) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffe8f, 0x0, &(0x7f0000893ff0), 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)="6c6f0000000000000000000000000200", 0x10) 03:35:37 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0xa0c80) 03:35:37 executing program 0: 03:35:37 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x4, 0x80000000, 0x8, 'queue1\x00', 0x9}) 03:35:37 executing program 0: [ 810.134736] EXT4-fs: 8 callbacks suppressed [ 810.134748] EXT4-fs (sda1): re-mounted. Opts: 03:35:37 executing program 0: 03:35:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000010000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 810.292066] EXT4-fs (sda1): re-mounted. Opts: 03:35:37 executing program 0: 03:35:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fffffdfc00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000006", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:37 executing program 0: 03:35:37 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x100) recvmsg$kcm(r1, &(0x7f0000001440)={&(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)=""/138, 0x8a}, {&(0x7f0000000200)=""/211, 0xd3}, {&(0x7f0000000380)=""/95, 0x5f}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x4, &(0x7f0000001400)}, 0x12000) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000001480)={{0x1889086, 0x400}, {0x80000000, 0xfff}, 0x7f1eb4ad, 0x4, 0x2}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000000)={{0xffff, 0x9}, {0x40b6, 0x7f}, 0xffffffff, 0x2, 0xfffffffffffff032}) [ 810.594000] print_req_error: I/O error, dev loop4, sector 128 [ 810.672783] EXT4-fs (sda1): re-mounted. Opts: [ 810.729515] EXT4-fs (sda1): re-mounted. Opts: 03:35:38 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$tun(r1, &(0x7f0000000240)={@val, @void, @llc={@llc={0x0, 0x0, 'c', "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"}}}, 0x480) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffe8f, 0x0, &(0x7f0000893ff0), 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)="6c6f0000000000000000000000000200", 0x10) 03:35:38 executing program 0: 03:35:38 executing program 5: syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x427e) 03:35:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000700000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fffffff400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00T', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:38 executing program 0: 03:35:38 executing program 5: [ 811.047746] EXT4-fs (sda1): re-mounted. Opts: [ 811.084254] print_req_error: I/O error, dev loop4, sector 128 03:35:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000ffffff8c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 811.129723] EXT4-fs (sda1): re-mounted. Opts: 03:35:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:38 executing program 0: 03:35:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00@', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 811.432922] EXT4-fs (sda1): re-mounted. Opts: [ 811.470473] EXT4-fs (sda1): re-mounted. Opts: 03:35:38 executing program 1: 03:35:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000080)={{0x7, 0xe1b}, 'port1\x00', 0x4, 0x1, 0x3, 0x1, 0x3f, 0x4, 0x4, 0x0, 0x1, 0xfffffffeffffffff}) 03:35:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000800000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:38 executing program 0: 03:35:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000600080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00740000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:39 executing program 0: 03:35:39 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000080)) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000040)=ANY=[@ANYBLOB="020080000014000004000000000000009200000000000000000000000000002b00000000"]) [ 811.946306] EXT4-fs (sda1): re-mounted. Opts: 03:35:39 executing program 1: [ 812.011511] EXT4-fs (sda1): re-mounted. Opts: 03:35:39 executing program 0: 03:35:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000001000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x006', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:39 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) write$P9_ROPEN(r0, &(0x7f0000000040)={0x18, 0x71, 0x2, {{0x8, 0x2, 0x2}, 0x2}}, 0x18) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:39 executing program 1: 03:35:39 executing program 0: 03:35:39 executing program 1: 03:35:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000030000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000000001e", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:39 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x204a00) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'lo\x00', 0x8000}) 03:35:39 executing program 0: 03:35:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00001000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000005e1c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:39 executing program 1: 03:35:39 executing program 0: 03:35:39 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000000)={0x0, 0x3, {0x1, 0x0, 0x1, 0x0, 0x8001}}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) faccessat(r1, &(0x7f00000000c0)='./file0\x00', 0x100, 0x400) 03:35:39 executing program 1: [ 812.789956] print_req_error: I/O error, dev loop4, sector 128 03:35:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00e0ff0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:40 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x0, "8fc454d141ee90e7"}) 03:35:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000001c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:40 executing program 0: 03:35:40 executing program 1: 03:35:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00520d00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:40 executing program 0: 03:35:40 executing program 0: 03:35:40 executing program 1: 03:35:40 executing program 5: syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x80) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400) 03:35:40 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) [ 813.283942] print_req_error: I/O error, dev loop4, sector 128 03:35:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000fffffff44d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:40 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @broadcast}, {}, {0x2, 0x0, @rand_addr}, 0x0, 0x0, 0x7, 0x0, 0x0, &(0x7f0000000040)='gre0\x00'}) 03:35:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000600004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\f', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:40 executing program 5: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x200200000403fe) r0 = memfd_create(&(0x7f0000000000)='$\x00', 0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) [ 813.473049] raw_sendmsg: syz-executor0 forgot to set AF_INET. Fix it! 03:35:40 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:40 executing program 1: syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') [ 813.608515] print_req_error: I/O error, dev loop4, sector 128 03:35:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000005000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:40 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) r1 = memfd_create(&(0x7f00000000c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x2}) ioctl$KVM_HYPERV_EVENTFD(r0, 0x4018aebd, &(0x7f0000000080)={0x4, r1}) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) 03:35:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000001100000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:40 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:40 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00/', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:41 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000bd7000)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@rand_addr, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}}, {@in6, 0x0, 0x33}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 03:35:41 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4280) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x3) 03:35:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000034d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000080000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:41 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:41 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xffffffffffffffff, 0xa00) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000080)={&(0x7f0000000040)=[0x80000001, 0x10001, 0x5982af9b, 0x1, 0x400], 0x5, 0x90b, 0xfffffffffffffffb, 0x825, 0x5, 0xffff, {0x0, 0x4, 0x3, 0x7, 0x7, 0x1, 0x7, 0x3, 0x1, 0x101, 0x8, 0x8, 0x170000000000, 0x5, "e93b3dc98b87b6c2962db9f9f190ba06378de0194c55ac2407bcd52b2736c630"}}) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:41 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(r0, r1, &(0x7f0000000000), 0x800000bf) 03:35:41 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\a', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000231f7dc339e55e1c4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a004c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:41 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8001, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0xe6, &(0x7f00000000c0)={0x4e}, 0x8) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:41 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(r0, r1, &(0x7f0000000000), 0x800000bf) 03:35:41 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000002", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:41 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(r0, r1, &(0x7f0000000000), 0x800000bf) 03:35:41 executing program 0: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00060000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000fffffff64d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:41 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x4280) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7, 0x101083) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000080)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x2, r2}) 03:35:42 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000000)={0xffff, 0x1, 0x8}) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)={0xfff, 0x6, 0x2, 0x0, 0x0, [{r0, 0x0, 0x5}, {r0, 0x0, 0x2}]}) 03:35:42 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(r0, r1, &(0x7f0000000000), 0x800000bf) 03:35:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00m', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:42 executing program 0: r0 = socket(0x0, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:42 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80480, 0x0) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000080)=""/162, &(0x7f0000000140)=0xfffffffffffffe0f) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x5, 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000008000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:42 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x800000bf) 03:35:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000011000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:42 executing program 0: r0 = socket(0x40000000002, 0x0, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) [ 815.320671] EXT4-fs: 13 callbacks suppressed [ 815.320685] EXT4-fs (sda1): re-mounted. Opts: 03:35:42 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x800000bf) [ 815.402826] EXT4-fs (sda1): re-mounted. Opts: 03:35:42 executing program 5: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x4283) 03:35:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000300004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00E', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000039e55e1c000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:42 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x800000bf) 03:35:42 executing program 0: r0 = socket(0x40000000002, 0x3, 0x0) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:42 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) ioctl$void(r0, 0x5450) 03:35:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x800000bf) [ 815.815893] EXT4-fs (sda1): re-mounted. Opts: 03:35:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000500004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000070000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 815.939560] EXT4-fs (sda1): re-mounted. Opts: 03:35:43 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0007000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:43 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="2a998c17c9678f9789b71aff675bd198a1323e0393627966d4541fa8b40155f877af1b73132f5cd1fb6cd42469d19a563fdeafe3f9c90ee670696eb3e9bbfce9b982f95047af77a25454aa009ad2850ddeeb3d00b2280e4033f27620726544574bdaf603fea0c02ad024075b65cb21439b6c2237c29c661def50996fba61fe5c33a71b11469389df01c9e38532828bc0a51889bb4e93ea6f106804e524473b8b5fbaf7103dae7eef02a279047fb1593e6741f6af213ec92ce7bbd0957634b00c5a01c51973c86e88c402c1a5d74825b07180b42cce2d65158a3c7b9c60b35d7dee749035b2d94b2d6d26ab57", 0xec, 0xfffffffffffffff8) r1 = add_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="1e13401f5d23c82f55e3cb30a559e8b158499af975e73d3788b671cf324b0eb69d6e7eade7ede62cd22ef5dce127a280e7fc560c0981cbe4e6a14f6dfe884889deb38505448f07c7ceaf67f29a2c7a54", 0x50, 0xfffffffffffffffc) keyctl$negate(0xd, r0, 0x3, r1) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) listen(r2, 0x5) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xfa00, 0x8000) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000080)={0x13, 0x1000, &(0x7f0000000380)="3dd21e8e540613bcc39c16767e7e3e84ba7a7745d3aaec8b4c0937931f4f476ab2e4f3e0bd7d742be2e14b377cb20286f95e2434d5da80ed6183fde31ae79a6b0276da536f32ac4c6ba1b8e6203b6bf6b06cc5537a6bde02f286ac2ca553a8e5974a00c729e276f52deabfd83957a4586617cb7fec0333e2aa5fea38341060b4e039e1cefabcef653a30d5255cbcbc7084e7f1336e070d0dcd0b40c3f817910ca060427387abea79231ce3fb7de6c2384837bc6fc832e78c3d96a29e0ef33cf1af859b276f3cbe6666af47fae833dcb472aa57ce2862855e6f406c1e52111ccb3016d65c26955feab9f2eb75b3c4ec6b87b056d3ae781f387cc2d6a24d1f307775960027fe012424f6e9e52073794bfca2d05c78ba0ed24491575238f0da9ed0ba62183472cbf0f56cf7384406483b1105646e8051801eb1d508ce2eeb80d9f513da78134a952533c55b5c3e90fc09fa0d0b0430d5138643f5bb15cb93f8be5dbd0a2eeb66e3bf1054d56a31b18e917f482dc3a25598bed680fe70cf504c4baea536b6969f78c9f2f189798b826c7cc05ee1141bd1f3f15f0547e803cb348bad63064b31b9d41ca873aa39a47679a56f013ae527bea498b8b1426778b9257445e0d3a3ac00408df029fdd5362f01cf7db4c16dcdc5797a3a659394c62c865c31d8789287687ec74c515fcb65717f0fa4aa9c4183fe76bef9851b4b9dcc42f5d24dba335d26dba9109567d6ea15aa731ec1027b1c07ccd48d0c33bcb7540f3fa66838deaf4b0dd437c3809bb8cc91e575c1e6cbd7111641f9a6a4e270a9bc0d553a1f1af50fcff6aaf9983da109b6d1683964ad5200a85cda8cb1c6ca01053247cd2b9a5936e8d049e00b329349d17c79d835500296526f0c198c698a80f8f843633b0e801fc9c3a1b7cb35ec8252d3450cc96a8c7120662b75ee6c93731cd87e373935844e7d3f5c00be2d093f372b3b192859c69c98d60f2e20d7dff71f5e3db902020e09349ac5a3701ba0cf5e7edb5dab5290b03322375013360a4790b5b0b695906789b5deb56a3bb9f182e9f6e118c9ab018e758c95579123c37c028cb005ec0fc82fe9f0e2166917c8838e7b3e0a0a29fc8f0d67e6a73706e4dd529b22a35d29ea58c5323b3c532da5eb31c3b251c0060612d06b44772f9feec9e85d168b9842f26d7000fbeb911995359527950591f3c86d2f07726dd03b8ac1392e47ff398bab5325cd53c472d13a434d02d51829a35467092d61a13243226ee8a236dbf16ac2cd8748db0351d070d2bc0afea8d1bb5f013e7b99a985fa216d5c47e61f85dcb52296532b87d12dfc907c17e58a3c690a98d4c135181589c001fd95e9464814bfaa5ca82be49852896d899ea66b7da457a7c70a1ac413406bed1b0c23111441f208792614c0c99fb877c3511491cbb1615a7a14e4fc533e84260d965ae764fb65d5ab1d003f9036993d22728deaea13cd6cc7a1a2247ee1d0eef8d45b12aeb62a3c1cfe90e47d6d36e6adcf4fe4102aef63d3ff97ced1195a2b48629b2ae4476f85d91cbda44395106dd98d08b2cc1b41692b6a8616362fe6d82a68755039ef19a4173f9cda43bb50353558f0497a55927728b2d986802a264983f36b0df6d9ee623c40f0e23cea0fb4545d631da7c87bd90f80ee7fe5c27a2ce012451dc2c7cb2ef7e97531e62704d83fc5804accd8dd5e7e71e0dc4d9c2e02c3c4e41124959ff3681ea1404aa9d3927e776e1e964aab121968c1b84e23d38166cd02e279fdc4216a68c2e6f900c2bec06019ed7ca0b3126fa59c032c5d12d55042894dc64fffdf9ad615a2295c7ebc5248af83412b97fdacba4b2016702db99b602b90edf91d02068d4412401eb12e6cd33206653e665e5f544ea31b88b5c69b5d85e57478b3a542886ad387c39b4322297b65d6e5d6e4116e744ec7071212fa8992f4c1944a2a5a0d80f02dffb2745369737f79357f270bfee7d4e02898a2d057fb4d7364ae57aa63ef2cb42615570c35442b14fcebbfcd80b820812bb4f8116ae9fc609935ecd90a6c80997bf710547518d7108b34fa366956456c71e83d0686c4bad6772b022bd13652ae87e07b0598dc0eb479fca821cabfd4836d17bb34b4525f885918325af56c1388bef68f8c6475d49ed9ff029c031247e11b6e1e05a67f9eca31c349659a2c6e3029ed8fed35ccc5b6d1e7d4a1cfef2b2be95d7c523b8ff89700d5f3a6d89fe4729fddb75742cba83444a0e50d20515852ab0ccc3b90e546485746e08474141843d4ff7818b0ee5097d6d22db92684bd110ceaa9d97c11e0603cbb810211ad05856144348488747d088f0012ccfc32fed2fdedab49af7c2136a4729c259ce36442160e4672203c0c7763c881574232c1450f515dbaa85f28738382c4db8a25fbb591988d86191cb517a20361566021a2af7f542278cac551c72a2f4c3ad2439a00bca61d96f7d03f0f69ef54b50458b77cd5d0636f70a6d2e7a3db38e912acfcbf93216b1998d2fa27043227b3497452d602ebd6a2d282379b6908f6eb1135f96fe5f4aee486f14c77a79042bb4577790a5f2cb153d147f15b56c550f2431039d4fe7cdbf3c05a25424213ef5c6890ed0745214384592544a6f8660a4ecf074b59156acd2c547d61e7fb6ab6852177417555aa4fbaa1fdb59f96b66d04cec8ad1990c93cf289ff520bf839683b4d31c475b21adf94b0186176269207a0110f721d832c5a7e7cb5e15f9c02d1f07340feecf7ddaaa3f706b1852b080a0ac115b985e1527386360d360e4968933250d9ec03c7a49216190ede4a62cc5d6ed7514ea262f4a78cec4a3f8746513b4a21a724c3995f7775914444a3bec199b7a5310ddd912ddc98b49bbacfd262a9b9a1322d27738c32d6039432945df00c321fca0ecece133f4cbaa992c2cf643e604256a16a5723fb34a840c8c3a2aabb13f1982600ebdb31492fdffb6b58ffe71ab21793a6ecbab0904620e37e5b756ee4c97b19acfed5aea8f92dc31ea5fb020e6017e967c8346f74acf34893ab45d051b290a86a63e597858767b386876b573df3f9f497770c1b7881829753e1ebdf40da32a464526a722260594ca6160b9f28f26a611e2a5067ea64c2fd39a67c8745048b83d3ec6ff65a91489d875858c2318f7e27c66f8a2cf098166e72cacb6aa5e0555e4e47fc291a8b96176e4b759959a1d6234c8f0d3e56080e80e4f9e276d72e86e93bd2dfd298b19ebca76c4018dbea66761c2eefe885f8dd0f3e51973e34de9de8bfc001124cf2b8acd497be476d53c2798e22f18b0a120c70bdf11c9f11a4dc575e1175b9f205e75031b3f65fc06ca915fcd14e4aa1ef02c79f4791e8f9c6afd727c858d449624048e7b18228b7591b521c97d477802a30c92d269ce714435986cf5b7618f566f86aef24ed0016c82b9a0897143868cc78c30a4cd75e9a4d2dcef21452ffdcd2a6c5d966d04847d1c83ae98696eecc47a500450c21596e2f3ec37788f77cbc68c5aaf9a35d02a9bd4501d97d3c29985847e8343ec55d91f93d98b78fac7db6f0ea2266ac3206b8d6a5ca11682791da33ec0d3d005215aa6813f3a779ea8cba0cea6e1de7cbd3ea182c73e0187c82c99e6323e7af774bdaf0a3eb586ea2761e922feb59a6e5ca8e0ecba0af6353182b5ad1030ea1f42d1ebea164dc82c97d78545293b70e2d66c1b8c89ff0be88ea4b37498b0ef34cae04f17986a629aee7fe3daad19a02f14a8a2bf4d74bb3fa2fd7dd94d4a5d7bdb4478167e9212fd721322abdf3989164fc296be5c4def256abc1362ebc0d99e001f2aeef2c86e3c85e6848c8e41b0933f210b2e1d4bbadc5e346fcb625204fd4b411c3ea7438bf343fe8fa0ac3a6410e30ba8619a58bacf76b29afb059563e73aeb43966b065be14c1b0ff0cce6f9f9502518bedd50fc3aa25fe38873d03528c73e1ea7a0a1d7cda49f134809324499f7a0814ca311ef7e0d5f07d0a2314996e11d7769b005f4f0fd714123cea7c4071a8da58176a5be39b930e3501a2b524118aabe46c19e7ac8d6ea3c2723f4e843a4ecef4e1eef4eac1208686d5368d9a85049447a10371d090209ceaf3f0f84f0b27986b6896b5961133e0db4de923314025292713b4974cc64621908a686c641f2b0709fbf50b12bbe1333e9b7ae5b53175a006c244d553ac48b0a986606f04f9a06d9cc3ebfed52e6a4d6a10672bacf22cb9bf89089c14810e4586449dd7a2778c0d2d16060b0d37b56919c338e943292374140ce80101c4edd1211aa07d433f8977e0d46e4879f77d8e29c2161a47fe30507e59e0e962c386f8a5fd61a3d39ad444a9246490b46aa6919734c69f46a30eaa46d842b915749c3db62803c7729b18ce1d78747d9c79a7305cfa7028419e02a217f1cff908605183f857674ee72bc96050ae7e810f3d67a190cfaf3fa199e5b7e1e88967de767b2d70f4f21d586d701dc1bb811cee535abfff0edba06f9ae6183c56c105580c30c610c7a68f08fbcf33f4c7c318ea64f1a1f294990a60913de9a96ed878d58f333686d15289121bf22e69a6b3025d3df87ff9359553bbb2fd92e7226a15acbc2da8f83caa691cf67c58ad96d4bc974359ecda5bea759557bf0d74173735e22e69df260c5cca4e3f538e5ad8eadb57ad862400dd273a5d443238660c5a5210d75fc5560dde204e390ee23153158dae450a83aecb1db07887ac982e1e5d24c4f352a09c5adb07ae765d94c3ec64eeb1819d4cee0f7e423b204f5135cedd32915d2aa73c2a6a10be44ef8d90ec0093a42e5e8a0a365bb9db5a0db4db5accfa5c592f9b2123f3f9df1ca1fa8213068047b466f93794098b8c6944e6b8c11bd12bc6676cfbea8a1c1118743e30a6b2a4a0eb1b65c7b27dcaa192a6b3a00eaf6fa55908b31332e21d44af5f32cb9762c239f615ba0bbd5fec0f17b03acf6d1883937edae373ea2de55fe34b68fb7dd70027df9d09f5e160dbaa4220a36b622e2182de65ea7643c74e94c05fc8096a2249f1c462a77aa1f111fbc3e059509eae3d87a05d2fab604d2c33feb2cefb520a2f817b25cad6bd398a127af2ce6c3af02a0fbc8b90c84ba2c0270494d9ae35296a5b7a5c6c63d4441e31d1eb72a1aced66b39f52bf678f8dc281c5972f25a31656290eec536a5244b10eee946ee770d562572b2604876cda2e53af9fb6d840eb806502eac6d0e7c3399cedc7e8d2c5cc1cf4e4f11c213a5b7b27a438625f2c3fb74bd2f6c4666c13ccba14ba8c30ffa0bb04f26e13bd2e0065f66af3f7621e8fbeac0dfa9883c37184b62a67411b54ff4138b52386affddab85a7f3472f5518906d6ee3dd9f14f8a9d7f45fc87bfbc822f0d57a6add09c7168d67975146b2f7a19857480587e0f4d28e0d2a90937e1e2f8d924fae879cd2a032ceef24a0003a10c7b8020576540b408de30919af16667b7ecae241e07802756818ed3a06541f6876e69a865ecb2c13717e61209f0e66b0c99c5598378bf9e925e845f454a8b87451339c3529c8fc9eb06b4fdfe3c80f6272e89d44261487292eb1dd1c6c1fdfe83a861aed4cfa51c52b60047cdd53665b073b8a38621acef71b0fa818bd436b37e9d9131e02c9f7c979c77f66d303c5fd015757933eed07dd210aaa24b78309344e9637c794a18e7dbc0031ecf512e19ec17dca81cbc77bd50a05824ea5422d447f59eae5a1ab88967219f66ec341122b5cd3e5a39c47c6b9cb6f4842c2e7260231b28bd6d5f4e6712fb7d2d16221a9e20728d28938a612c92d83f0475a19aa31ceeefde05a6d9"}) 03:35:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x800000bf) 03:35:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00230000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:43 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000002000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:43 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x4, &(0x7f0000001400)=[{&(0x7f0000000100)="38a90276fd3cd32d8f2d75ed22369289c325f4f16153bff2152d629fdb5a5dc8e870120dd02802c731017943dde301f7f09122a959cf52bcf9e4c01217c991038693833c73609cbec6be4e9ff127d689e322144c863ce12ad5429ee7d17a806c8f478ce8b2b31f3c842f35f5ed9b7d01f3d14e68e69add15e0caaabd149da4aa97d61d84cbaf7924d8b80c9e1f75157ab7345b87b4212c1721819f73faf860d18abf5c8988dbb10a40f73aba909af29b0961d57adfc4c5076b3dc7479525dde172c286f989f5461f82e5e06fa06bcc0840922a37a3f5da84c8de0ccadc35f257780698944e", 0xe5, 0x9}, {&(0x7f0000000200)="ee20094ff6d7e4348f223553822b4b7f1016665f44c5ff7ed34c95d06c8cafc9126e3d9405aa0f46ce4816c9308ece3517f35b9ae429f01535fdbfe229d8cac9bccbabf737a3d2106a04cf1dd878940223dfade57d2314ae6affe8dc784878aa82273196e9aadbbfc8d21a93ce036dcd8ef3ca4f8e63d36e8aed7dd8d9f6806713b9365001067b3df40db5e555f7f8a47db19e3ea7cb1a7419581a9242aef80fd29eda1f46f7897b01b92309598b9158cb8c9bc0d1b3193f44f4a24de1c15d7b450c6deed50b507142d82bcf1d", 0xcd, 0xfff}, {&(0x7f0000000380)="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", 0x1000, 0x2}, {&(0x7f0000001380)="361662f2c605bae2f3f3512c4d98de5daf4d7808bcd068a0a45ec89b25d26da72fc0f3a23db0102e77c6f37363aeaf94fc57bbea4423df4a2d4ce24a658be19f6d64927ca9e98f2d8f7ecba9ef18a6f95ea856e8e73ac812d54e98cf6f9342a02735ad8a3b20c1", 0x67, 0x1}], 0x3080068, &(0x7f0000001480)={[{@umask={'umask', 0x3d, 0x2}}, {@type={'type', 0x3d, "85dfa87f"}}, {@quiet='quiet'}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_role={'obj_role', 0x3d, '/dev/snd/seq\x00'}}, {@dont_hash='dont_hash'}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{0xfffffffffffffff7, 0x2}, 0x1, 0x9, 0x80000001, {0xfffffffffffffffe}, 0x1, 0xbeec}) [ 816.290052] EXT4-fs (sda1): re-mounted. Opts: 03:35:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x800000bf) 03:35:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00ffffffffffffff7f00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 816.359213] EXT4-fs (sda1): re-mounted. Opts: 03:35:43 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:43 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:43 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000000001c", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:43 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4000000004280) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0xbc800, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000000c0)={0x4, 0xd6, 0xf9, 0xfffffffffffffff7, 0x0, 0x40, 0x3f, 0xffffffff, 0x2, 0x2, 0x2}, 0xb) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffffffff, 0x200) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000040)={0x7fffffff, 0x200, 0x100000000, 0x7, 0x9}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r0, 0x28, &(0x7f0000000300)}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xe, 0xc, &(0x7f0000000100)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r1}, @generic={0x5, 0x200, 0x7, 0x8}, @jmp={0x5, 0x1, 0xf, 0x0, 0x3, 0x6, 0x5}, @alu={0x7, 0x1, 0x4, 0xf, 0x6, 0xffffffffffffffc0}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000180)='GPL\x00', 0x0, 0x69, &(0x7f00000001c0)=""/105, 0x41f00, 0x1, [], r2, 0xa}, 0x48) 03:35:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000ffffffffa00100004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:43 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:43 executing program 1: r0 = socket$unix(0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(r0, r1, &(0x7f0000000000), 0x800000bf) 03:35:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000004c00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:43 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) flistxattr(r0, &(0x7f0000000000)=""/56, 0x38) [ 816.847975] EXT4-fs (sda1): re-mounted. Opts: 03:35:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000007fffffffffffffff4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:44 executing program 1: r0 = socket$unix(0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(r0, r1, &(0x7f0000000000), 0x800000bf) [ 816.930513] EXT4-fs (sda1): re-mounted. Opts: 03:35:44 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:44 executing program 1: r0 = socket$unix(0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(r0, r1, &(0x7f0000000000), 0x800000bf) 03:35:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x003', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00fffffdf90000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:44 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x800, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000001c0)={0x30, 0x5, 0x0, {0x0, 0x1, 0x80, 0x79}}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@ipv4, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="5c0000002d0001042bbd7000fbdbdf2500000000", @ANYRES32=r1, @ANYBLOB="08000c00ffff0e000f00f1ff0800010062706600280008b53a5e8c3bde02000c0007002e2f63696c6530000c0001002e2f66696c6530000c0002000800000000000000004d05a27d14610af10000efe96d29535d19b93d8b26b1757b418507d19e7d059eed7968abdb9caf85d52740000000a194b754c148c393ecb988421a560096643e197833efe95bde2e773eac40661730b1e0a32b2cdd3dcfff3e7f7add3b"], 0x5c}, 0x1, 0x0, 0x0, 0x20000001}, 0x10) 03:35:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000fff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:44 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140), 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) [ 817.287669] EXT4-fs (sda1): re-mounted. Opts: 03:35:44 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x200) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040)={{0x8, 0x3}, 0x21}, 0x10) listen(r0, 0x5) 03:35:44 executing program 1: socket$unix(0x1, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x800000bf) [ 817.415581] EXT4-fs (sda1): re-mounted. Opts: 03:35:44 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140), 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000480000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00P', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000090000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:44 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) r0 = memfd_create(&(0x7f0000000000)='-cgroup\x00', 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000013c0)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000014c0)=0xe8) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f000000affc)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00006a3000)='/dev/audio\x00', 0x0, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00006a6fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) ppoll(&(0x7f000026c000)=[{r3}], 0x1, &(0x7f000097d000), &(0x7f000016a000), 0x8) read(r4, &(0x7f0000000280)=""/72, 0xffaf) recvfrom$packet(r0, &(0x7f0000000040)=""/107, 0x6b, 0x100, &(0x7f0000001500)={0x11, 0xd, r1, 0x1, 0x6, 0x6, @remote}, 0x14) 03:35:44 executing program 1: socket$unix(0x1, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x800000bf) 03:35:44 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140), 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000001c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:44 executing program 1: socket$unix(0x1, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x800000bf) 03:35:45 executing program 5: r0 = socket$inet(0x2, 0x4000000003, 0x20400000087) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000001200)={'nat\x00', 0x0, 0x0, 0x90, [], 0x10000248, &(0x7f00000001c0), &(0x7f0000000200)=""/4096}, &(0x7f0000000000)=0x108) r2 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000280)={{0x5, 0x607}, 'port0\x00', 0x20, 0x400, 0x6d, 0x2, 0x200, 0x7fff, 0x2, 0x0, 0x4, 0x6}) r3 = dup3(r2, r2, 0x80000) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000380), &(0x7f00000003c0)=0xc) r4 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x80, 0x80800) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x80}, &(0x7f0000000100)=0xfffffe54) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={r5, @in6={{0xa, 0x4e20, 0x0, @local, 0x1f}}, 0x6, 0x400}, 0x90) getsockopt$inet_int(r4, 0x0, 0x3f, &(0x7f0000000200), &(0x7f0000000240)=0x4) 03:35:45 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f486003e4cdeae2c0", 0x3c, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00H', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000006000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00fffffff40000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:45 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x800000bf) 03:35:45 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000000)=@abs, 0x6e) [ 818.144860] kernel msg: ebtables bug: please report to author: Num_counters wrong [ 818.218906] kernel msg: ebtables bug: please report to author: Num_counters wrong 03:35:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00k', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000001c5ee539000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:45 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x200000) [ 818.277315] print_req_error: I/O error, dev loop4, sector 128 03:35:45 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f000000", 0x1e, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:45 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x800000bf) 03:35:45 executing program 5: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4282) 03:35:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00004800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:45 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000), 0x800000bf) 03:35:45 executing program 5: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000404d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:45 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f98", 0x2d, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00o', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00480000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:46 executing program 5: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003e40)={&(0x7f00000026c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000002740)=""/111, 0x6f}, {&(0x7f00000027c0)=""/79, 0x4f}, {&(0x7f0000002840)=""/215, 0xd7}, {&(0x7f0000002940)=""/70, 0x46}, {&(0x7f00000029c0)=""/207, 0xcf}, {&(0x7f0000002ac0)=""/105, 0x69}, {&(0x7f0000002b40)=""/82, 0x52}, {&(0x7f0000002bc0)=""/4096, 0x1000}, {&(0x7f0000003bc0)=""/152, 0x98}], 0x9, &(0x7f0000003d40)=""/200, 0xc8, 0x80}, 0x60) getsockopt$inet_dccp_int(r0, 0x21, 0x1f, &(0x7f0000003e80), &(0x7f0000003ec0)=0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x7ff, 0x4) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f00000000c0)=""/153) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000080)={0x7, 0x8}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000180)={0x4, 0x3ff, 0x60000, 'queue0\x00', 0x9}) 03:35:46 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(r0, r1, &(0x7f0000000000), 0x0) 03:35:46 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000fffffdf94d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000900004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:46 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c", 0x2e, 0x0, &(0x7f0000000000)=@abs, 0x6e) [ 819.133340] QAT: Invalid ioctl 03:35:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00&', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:46 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(r0, r1, &(0x7f0000000000), 0x0) [ 819.154988] QAT: Invalid ioctl [ 819.173827] QAT: Invalid ioctl 03:35:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000001000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 819.199919] QAT: Invalid ioctl [ 819.216133] QAT: Invalid ioctl 03:35:46 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x2004280) 03:35:46 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefba", 0x32, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:46 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/arp\x00') sendfile(r0, r1, &(0x7f0000000000), 0x0) 03:35:46 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f", 0x34, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:46 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000fffffffd00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0004000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:46 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x101000) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000001c0)=r2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{0x0, 0x7f}, {0x5, 0x66}, 0x7, 0x0, 0x10000}) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000020000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:46 executing program 0: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae3", 0x33, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:46 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:46 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x101000) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000001c0)=r2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{0x0, 0x7f}, {0x5, 0x66}, 0x7, 0x0, 0x10000}) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000100004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00W', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newaddr={0x34, 0x14, 0x701, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x6}}, @IFA_LOCAL={0x8, 0x2, @loopback}]}, 0x34}}, 0x0) 03:35:47 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x101000) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f00000001c0)=r2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{0x0, 0x7f}, {0x5, 0x66}, 0x7, 0x0, 0x10000}) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000feffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:47 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00002000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000102000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00d', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:47 executing program 1: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x101000) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=r1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:47 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) [ 820.380485] print_req_error: I/O error, dev loop4, sector 128 03:35:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000f6ffffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\'', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 820.549718] EXT4-fs: 13 callbacks suppressed [ 820.549728] EXT4-fs (sda1): re-mounted. Opts: 03:35:47 executing program 1: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x101000) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=r1) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) [ 820.619735] EXT4-fs (sda1): re-mounted. Opts: 03:35:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x008', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:47 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\'', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 820.733372] print_req_error: I/O error, dev loop4, sector 128 03:35:47 executing program 1: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x101000) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=r1) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000007fffffff4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:48 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00001f00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 820.934242] EXT4-fs (sda1): re-mounted. Opts: [ 821.020961] EXT4-fs (sda1): re-mounted. Opts: 03:35:48 executing program 1: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x101000) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000001c0)=r1) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\'', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000005", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:48 executing program 5: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000064d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000008000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 821.297706] EXT4-fs (sda1): re-mounted. Opts: 03:35:48 executing program 1: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x101000) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000040000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 821.409221] EXT4-fs (sda1): re-mounted. Opts: 03:35:48 executing program 5: r0 = socket(0x0, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00*', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="001f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:48 executing program 1: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x101000) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:48 executing program 5: r0 = socket(0x40000000002, 0x0, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000ffffffffffff07004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:48 executing program 1: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x9, 0x101000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) [ 821.763886] print_req_error: I/O error, dev loop4, sector 128 [ 821.792673] EXT4-fs (sda1): re-mounted. Opts: 03:35:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="001f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00f5ffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 821.885860] EXT4-fs (sda1): re-mounted. Opts: 03:35:49 executing program 5: r0 = socket(0x40000000002, 0x3, 0x0) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000804d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00+', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:49 executing program 1: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x400000) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="001f000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:49 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:49 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00fcfdffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 822.300989] EXT4-fs (sda1): re-mounted. Opts: 03:35:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000003f0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:49 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) [ 822.402173] EXT4-fs (sda1): re-mounted. Opts: 03:35:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000001c000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:49 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00M', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000140)=0xffffffffffffff9c) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000180)=r1) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000001c0)={@loopback}, &(0x7f0000000200)=0xc) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000080), 0xc, &(0x7f0000007000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="180000002e00ffff0002000000400000030000009d617570af1956eb7400000000000000000080d8e1dbc272764aa972500e94ceb532487827ce086fd0d28fae2f7e87df82c020"], 0x1}}, 0x0) 03:35:49 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000680000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:49 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) 03:35:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000ffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000007000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00(', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:50 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:50 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) 03:35:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00fffffdfc0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:50 executing program 0: syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x4280) 03:35:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a003f0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:50 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:50 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) 03:35:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000004000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000700004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00x', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:50 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:50 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/zero\x00', 0xffffffff7ffffffe, 0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340)=0x0, &(0x7f0000001380)) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='.\x00', 0x7, 0x3, &(0x7f0000000140)=[{&(0x7f0000000100)="c0904c2ddea3197cefa5abca8054b605478338f0e39798ec5792eced1b5f56106256a238a1dd1268d964", 0x2a, 0x7}, {&(0x7f0000000200)="e8d1aef3eb194bf67d4144201e7f3821ef0cc7c1a7d3580a29b7ee5afcb17051e96ae31132e5a6aa547b4891c50ca3c31d787398062ac28c87ef52ecc393851460e58a944d307c0d4455686c401e5dcf92bb1dc1ce5f9f3cda30bfc3ace342fa5af105840fd683e8a57e410af4d98da8ba0f7aabd92566d1a1ff4100e1bb9093e73d7b612261c3da4a52d19e7a084268b9d29bd228d796e1a7dca85a7f814f38a5d1a0a81e2dc85c0ab73a4d7478b157dbc061e5b0803661c310140d33271f4f58c41eaa2b51bfa72c3ff46c0ee90e072678102cc82076758780fa", 0xdb, 0x2}, {&(0x7f0000000300)="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", 0x1000, 0x200}], 0x801040, &(0x7f00000013c0)={[{@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@largeio='largeio'}, {@pquota='pquota'}, {@filestreams='filestreams'}, {@nogrpid='nogrpid'}, {@logbufs={'logbufs', 0x3d, 0x8}}, {@dax='dax'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@dont_appraise='dont_appraise'}, {@fsname={'fsname', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) getpriority(0x2, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shmctl$SHM_LOCK(0x0, 0xf) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400000, 0x0) 03:35:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x8000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f0000000000), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000480)=[@textreal={0x8, &(0x7f0000000300)="67660f3a400300baf80c66b85fbeb78066efbafc0cb0e3eeba200066edc30f350f20e06635200000000f22e0660f3830b3708f3e0f060f01712166b9800000c00f326635000100000f30", 0x4a}], 0x1, 0x10, &(0x7f00000004c0), 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x4) ioctl$KVM_NMI(r2, 0xae9a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xf2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000200)=ANY=[@ANYBLOB="0300000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000004a38f1e9386c8b25c44d870000000000000000000000000000ecffffff"]) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000280), &(0x7f00000002c0)=0x4) timerfd_settime(r4, 0x1, &(0x7f00000000c0)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000100)) shmctl$SHM_LOCK(0x0, 0xf) 03:35:50 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140), 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) [ 823.613374] print_req_error: I/O error, dev loop4, sector 128 03:35:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000000000003f4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000004000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:50 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140), 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00B', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/zero\x00', 0xffffffff7ffffffe, 0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340)=0x0, &(0x7f0000001380)) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='.\x00', 0x7, 0x3, &(0x7f0000000140)=[{&(0x7f0000000100)="c0904c2ddea3197cefa5abca8054b605478338f0e39798ec5792eced1b5f56106256a238a1dd1268d964", 0x2a, 0x7}, {&(0x7f0000000200)="e8d1aef3eb194bf67d4144201e7f3821ef0cc7c1a7d3580a29b7ee5afcb17051e96ae31132e5a6aa547b4891c50ca3c31d787398062ac28c87ef52ecc393851460e58a944d307c0d4455686c401e5dcf92bb1dc1ce5f9f3cda30bfc3ace342fa5af105840fd683e8a57e410af4d98da8ba0f7aabd92566d1a1ff4100e1bb9093e73d7b612261c3da4a52d19e7a084268b9d29bd228d796e1a7dca85a7f814f38a5d1a0a81e2dc85c0ab73a4d7478b157dbc061e5b0803661c310140d33271f4f58c41eaa2b51bfa72c3ff46c0ee90e072678102cc82076758780fa", 0xdb, 0x2}, {&(0x7f0000000300)="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", 0x1000, 0x200}], 0x801040, &(0x7f00000013c0)={[{@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@largeio='largeio'}, {@pquota='pquota'}, {@filestreams='filestreams'}, {@nogrpid='nogrpid'}, {@logbufs={'logbufs', 0x3d, 0x8}}, {@dax='dax'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@dont_appraise='dont_appraise'}, {@fsname={'fsname', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) getpriority(0x2, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shmctl$SHM_LOCK(0x0, 0xf) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400000, 0x0) [ 823.933690] print_req_error: I/O error, dev loop4, sector 128 03:35:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000ffffff8c000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000007a0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:51 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140), 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/zero\x00', 0xffffffff7ffffffe, 0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340)=0x0, &(0x7f0000001380)) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='.\x00', 0x7, 0x3, &(0x7f0000000140)=[{&(0x7f0000000100)="c0904c2ddea3197cefa5abca8054b605478338f0e39798ec5792eced1b5f56106256a238a1dd1268d964", 0x2a, 0x7}, {&(0x7f0000000200)="e8d1aef3eb194bf67d4144201e7f3821ef0cc7c1a7d3580a29b7ee5afcb17051e96ae31132e5a6aa547b4891c50ca3c31d787398062ac28c87ef52ecc393851460e58a944d307c0d4455686c401e5dcf92bb1dc1ce5f9f3cda30bfc3ace342fa5af105840fd683e8a57e410af4d98da8ba0f7aabd92566d1a1ff4100e1bb9093e73d7b612261c3da4a52d19e7a084268b9d29bd228d796e1a7dca85a7f814f38a5d1a0a81e2dc85c0ab73a4d7478b157dbc061e5b0803661c310140d33271f4f58c41eaa2b51bfa72c3ff46c0ee90e072678102cc82076758780fa", 0xdb, 0x2}, {&(0x7f0000000300)="2c8fbd038b7f965c9a6e0d001fded2735daa7abc259bc0a86d24bc8e05bdc8769bb64e4c68dccb10f4add0c56e25009d3b43feb99c578cc7ff1b29b513bf910065a177f495768720a98e40339f311355b0219db81e7214188816b1293c89a295eac987b4131b7e81262bc12e043fc57d4af9b27726431f9a09afae9a23c5ef38089edf2a0f8b8436df4be81b134d336966da2a212105967500dce4fd69b3913ca3a7f66aab6632b53fd8a37ab32d0927b0c38295e67b44eb3ecb8ada4c638435e1d689e903019abb319c1546ec2a90e9a7d048606602e172a42b13aed47b06e724502d2ba27e4f26a8650279648fecb11d639049cd877fdec6ee5e77706427dfe12630248743d0e02ed6a458452c9121eba6be5c5caf3d26aeccf51a47086d2415adf8a526dfdc4bd9b140701c2d53f552fcb5edaa6a2a86596846fbced652e06e8f49b3640bb0e33131495376a30cbedf08bbf4e43a2251a0fe45457a226a043948ba890fb05e0134e86dc28c922bdb37c8dcef8d78511da8f5e7e40aed1073713513fe6da48564bb282ee6bb13d1b6fab071373539437290dbfd586cfdb7177a99c0d0cb7580df06c6e987c1872b04d5a9d2b9f7325685a1036c298f141293bbfef4fea22bd0ac587fe9e7a9df1ea1f7af352926dd315a7edd7f5841471c956db7a7cc480b80227c9804a0568e8b8093fe7693fc437d91268a21930d4ccc681240c5542317da517c41f6a1e02936c2b109fdc6062e1f783bae58f491eafd32ca0ad486b9676778732245a77123c9ce0ac52e2e07e9f0f0580dd860bf75f271a07e4d7495d6aa1ef367525503f54f620d36b0bf29eb8caae1211c80f9d0c2394e9c0b46747b97bdc0aeff65244d96c7aeb305df24cf58cc25f177727f5408c791861444cc598846ca78ba56090a8a4cb76feeaf55fa6b847fe4de41a64d13365872a506aebc5aed01d10f9c8a805268381851de42e08d09f5b8f02511631d16ce5d5ee6d475b37cb06331706854915d8d6d761a42c2c5da5c07190dad99172740d7da45b5aa1310a566f993a675b0827098d8c8d2df8081ff60966e53e7cb2e288a6821f92ff9bd6aca04d5c016737d2b95d5abd06703191c071c4304645f17983bf300c8a0e9511551f5451f21d3a503136a3a889ad90ba386d11922780bee1f37f1d0ad571099565b873defac2610d431c71bfc14b5700d52dfc2ba2ad430883e5b3702f9ccba81867a61ac8bf2aedf0df968f6b1a14589b6c8476d9172ab75a7592bbf001a327e666193a0d24a5bc34774beaef7dfe1af1173892c5bebf9dc002352ba06de9db6c93755e4b30cf33f14678a41d10efbec461689bff4848bb1f2a1618ea1e1c2f1637b7cb73d3e55deaa4cec5e26935b7298483b5d79c80292a06ce3bec72681038aeed4207e5012d7b20e0f7ff81ca4eca2be66905e8c2b1b3069a43e52be8747e8e857f67feca0d8fb435f544fb49ac0d6f493e9d3aa2e7c1f9478d6a1145c9806efc622220657c7ce6419def9fa672e94aa378c3bb6405daadfb24608bd56a3a82728a7adf99fec95cbee132be9372377ee9489bc1439509986eb33d76632b104f3bfecf0ec86398605626622720768d97a0b4baabebdb8b493b2d05d2a1567ce5d3a6b375f7c71a4d66015aff1733f56c621099244ebd911bc09955815d2480167767f7cbdf9308cbf4d3e46b1bfbed2493125a7ec5a8f4b5adb05d88ecea9ebab3bd755bc333fb7d2c631e76e07b368d5fad1c004d0dcf2ee1945e66d5dd42dee5146e8c57f728150c1de2a4ca665e1cc942134b5a8857db9bdcbd9e61d75fb3f49e6e3c7c5436d0fac84cc5bb440380efabb1395bafd36e118d507cc65fef2465ce87a30389cf23ad63a9c7c7063b2139c5f3a49472ea1141ac3f10aa0ce282850ac3dbe27d93573b191c78abdb73a167a1073dc212954b7c51d0de85301284cafabfd3a40ce2645565237f18339ce47f8234c0885c12c87cd024f7387595e1e992c1f50c1d022ee1c4daa68cd9c39e77fb277257eb4627483b7264948cec694b6cd2fa2191ca12db81e4ac9232527c421a153ad46378bc4c2460b0132453933f6bd1856cc6889b4518da61d1884723319cc490132da98e392c74c19ec6e14fc76cd1c1cc81750b19d1024c71c6f48b61bac32e1a17f96d40bc7bcc702709d37b1472d27f5bcec07fa8ed9d4d2638c85fe3d6b6f79b8e5ce9d4d668e4d17bbb5c637fa6873654a223f3e68633efd462da4d6b07dc3d908d5f89e611d7ffb5186341baf4d21f93db09313df95f6438d8eb8ae3968d95842dab204504ed1a6a0920cfafc13b41d6cb40b15d2a8a829f5bc3583552bb65f629e1cf76693898929946a1b2aa4cf53264665c6fdb7a21c0395abd5e360ad6cb0d534250b000c75c3618f2dab1611147f5188afa05d6cc0bd5b1d73e168f3b2a28c6090857d7b2718e6b1118dd9e6cd3cee2ae4b9136a0bc0447ea17bd50e80fc3c84aeb8bc85e6e2ac9e502cc573d6b0f8f941b8bf5843353505081207f5dad35a46f626f7101ed6be36976a2b122e3fe31351787c86d4bacf5d593488b74117c80cd31da87ebe0fc75c54fa9eae308aabff85bc6e41b6ecb687863cca456654636725abc6386bec98748c9b2fef4429cab422ea088361c8e6a868d158d29eb2fa7c6df9fd0af282d6759c76feab4767ee5f7f60048f0ab49a4e2090b711eafe848a13e137a69a7052a4b0b38dc8a89939d8b874d7f63c9dc5f4a56571d27068400956d09d86ca445341e8930b39e3e06266fbafc8b8468c3e71020acd3f66cb456f9597f45e950c6c061bad213719f8f9de978108b6496f110afd19139b135409f07a58416cc82a5a719ef13ca6316e18892e168558bece625f1675aa7ad64a34b01f8b018e1fd7ec0235ab2b2496078c7891c0491d38e2f75f8944b1639df2012a1e52abc2c007b08c75af00f040f56856b3f0352df0f12894a6562d7947131c724c9ea9dd56b26284a3a205e29517f1738cedc83580220744a76e3daf8519349271eaec782098792ed68fc615bfa5ac895542cc6197788114e10befb79115053bc60dad1b4abf7ad14889031c5b0d3ec3f3772035edc81528552d7667d07e92d73ad6f3d348c3d1e0a3f2866a1020fc53e9ecc7e11359fd027b516d637bbd9266b64a816e58d999396e15beebab1bd75a413d401d545142ef5c46638199b814f1452a0b92dfddda2c35a1e967c15ab9cfee31fb5d6f5dd62f55fe9fa85606a33d942f22fb1c205d8f0b2c86bff927d3e3507cf8c14b7af55fe49e9fdec723681dfd0f3b71361f9308ed632b7e9f8b1de6e332bdb782048651074bbd81ec7c7a170e6f761c0f9c9078c06cc9032a3f0c5e2b0bf7ec128bb86b96ab98e0b6ef5ee89984fde60b3f589fafd2806cee692c860aee71c132eff5d2625e46072d88b27fa7fec08a705ed5d60e7fb91f413c158af8354f64080147010e13ce6a70bf75636fbaaf8c21853da1c4851dbb909a32b5c14259559b2e6b39b1fcc5251d0b9d6a4de6f7ba63e9cf99787afdb5ca691c11c6bbd98b23f327b9c92526a9e930a5ea3c79e4db8ea7f5f3a3ea0f0b1bd290cd651d21472fa5d17f91a67459cf026310a08cb7c6a2c39fbec360378288b86d9fed5ce869875b925f99d86bec8a3e96687b44db8dceb781100c06d5b9d6c101ff9e06c584e04729912200fe3fd3a87c973f249e85e1dc76244344f1eef00506a82d94c835ea72fca6ed6be69f4e5ef02ce92c9916c4ff8eee17c1d02fe84268f0a8e3a235c8039fe2e360361e5ff0934bd9b6b031c9e37c6b82634f87fd96df6570dc2cb17b99f37b2c3bf900335eae6229a112a5176b85eba413f563826232025137f02faf28cae4100234a3d4c52da4a0aeba7aed145d41c9781284caca95f2ac19488e32e5fdb0a468318ecacfa5e31f74d6244b9ec56f43cd4282b627f399615cafd1a4a3d04b201a51df8aadaacba359f06a0a018675711811857acb564cfc686dcb1f9fc61a1031c3b2401b1e23e96ecb40432094007558c317076199d8a5bb6230de10a7dd5770876e71eab2472aaa98a562ba745f330b67c0998d786bc93a820ee2b80ccb23e3ed47f593439ad8508fe555470107d2742adfc6224241a8e1ede591b95e738cb69f9752506065ffe454d8545c0b8c450fdfd5aa7cd6767d966d32364f3583b73fe53c0477adedd5e7f83c4e0c11b4e7f53f234040bdda6d208d2531cfd61c963cf3ab53e04acc874e1dfb6f08c879b7906f220c004c37921170ed6ae3e7bfa00f803f0d7d4a3cf16da3b9ed07bb0c305e8773cae05a9d186fd8de26929fd3831137b2412c8b625311e9d057e14595d03ed5e27abd626c0dfdae8b98763b3872363d2f911735a433f322d1b4ee393e940de68d1c5c2de5dfc3faee346ada5d269c01ad48ad4cd5518a97f1d7d4034ac7667ca34102b718644cf2c84b34390606a86537c3fd9d19f7810025d28276cf2b5a657600623230f7c0ba1740e8a79bdf3e61b51e5c8abd86836fbb9c12ca6a79616f76585450fe6bc568341f7eee2e8d444eb27e2713169b1c1b4f0fad7478c7a82ed5420a1fdb829e1de2ae4ab2ff20cd948e81306ca70607365124c0beeedd676bdceebbd1f3af2984e6fe0eeaabdaedafce139f4b25ee434339d0e64f6923f0977dd6ece3bb181e1e1f52e083e748295ebbd17942833f2a15f049ab7d43e77975b915742edc9a434198f922c6559704e1aaa7a761021ac8779ca0f5b804b084bb08f9260ae2bd7b8254b6b19fdda6c59bb15dc1404d5ab5e8468df9da1d2a681eb8d53b47ae32015c3b95a71f246418460650ebcd5b7155b6fdc9d1aaab1e172de0021a499a81654c20c5989d8601ef0da5911e861c9fc201fd38d4e81df4a3566817b8353078e9b34dcc44ef21da01d0e1610b9b7ba9046bcbef93de213af504e83ff792dd501e2bfe071c78975cb4f0236985a4f82c1183722ab05184734bad5bb0c3721589f3ecc70b82334aa57dffbe2c4e21d0d70401d9430a9b30bbbac3594ae916c9bc5b767a89056a06a9082c9bf484dab9a2115a6d2b63946bdc874c9ffc8f53b0a3cd5047bf20c71480db24c99a6040b52bb83fb0a1c19b7ee60727eeabf4dff4148bb5e27f88b5581430c4c8864362fc4f61346f5c72bdcf3c2e396692b85f58bd33940ed82ccd5d2f611b60e4609e9abf1cd1b31ddb3cef623afac1c3b358da5820e04f7305091ce25c47bef838be7c8ea336000ffed73194e77d2902bf0465e09ab1356812310fbaf5519e16638e86ba0fda8b22cf8eb68856a411e3182300c79bccb6002999e4c9a02cc8e5dd108a5e5043fd817eeba4f2c12bf0869cb69cb8e729c45bd24c31c3d400ccb83b81f899f8af89dad5edacab15f457127d4d8c9640392158313929740a6c41815effb2e5d8aa8527fe7e31aed8de6ea5145f5c57bff408b7dd62b5397116cdd069375ab8da1f74077e0ea57becb713846b53f0deaf9f3ebf8b6d766c96d53a8ef719cd3758c486c8cff1d948abad9ab469fe7b1a6e81864fe05905f89aea0bdfd53c9e83d223ddba5670b4d6a41a30d4133d39de01b4cbd5e431d4f444e4a26924b672a2d0bc81442b09baa19e6540e5021a7cf810f8edb2aedc7ef72f99dbeb420c5f1ac9e03f2f42305b77d9ae26da5d11c087164b703341f4f3cfcf5df4fdb07495557e989688aad5b8fcf7802fe22f7891efaa7008961e05ed93ff67bc0f0cb8565fb9e5619843ef40d5193d1784ed6cfae14c467bcec9f7c8ad7cf655", 0x1000, 0x200}], 0x801040, &(0x7f00000013c0)={[{@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@largeio='largeio'}, {@pquota='pquota'}, {@filestreams='filestreams'}, {@nogrpid='nogrpid'}, {@logbufs={'logbufs', 0x3d, 0x8}}, {@dax='dax'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@dont_appraise='dont_appraise'}, {@fsname={'fsname', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) getpriority(0x2, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shmctl$SHM_LOCK(0x0, 0xf) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400000, 0x0) 03:35:51 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f48", 0x35, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a007fffffffffffffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/zero\x00', 0xffffffff7ffffffe, 0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340)=0x0, &(0x7f0000001380)) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='.\x00', 0x7, 0x3, &(0x7f0000000140)=[{&(0x7f0000000100)="c0904c2ddea3197cefa5abca8054b605478338f0e39798ec5792eced1b5f56106256a238a1dd1268d964", 0x2a, 0x7}, {&(0x7f0000000200)="e8d1aef3eb194bf67d4144201e7f3821ef0cc7c1a7d3580a29b7ee5afcb17051e96ae31132e5a6aa547b4891c50ca3c31d787398062ac28c87ef52ecc393851460e58a944d307c0d4455686c401e5dcf92bb1dc1ce5f9f3cda30bfc3ace342fa5af105840fd683e8a57e410af4d98da8ba0f7aabd92566d1a1ff4100e1bb9093e73d7b612261c3da4a52d19e7a084268b9d29bd228d796e1a7dca85a7f814f38a5d1a0a81e2dc85c0ab73a4d7478b157dbc061e5b0803661c310140d33271f4f58c41eaa2b51bfa72c3ff46c0ee90e072678102cc82076758780fa", 0xdb, 0x2}, {&(0x7f0000000300)="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", 0x1000, 0x200}], 0x801040, &(0x7f00000013c0)={[{@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@largeio='largeio'}, {@pquota='pquota'}, {@filestreams='filestreams'}, {@nogrpid='nogrpid'}, {@logbufs={'logbufs', 0x3d, 0x8}}, {@dax='dax'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@dont_appraise='dont_appraise'}, {@fsname={'fsname', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) getpriority(0x2, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shmctl$SHM_LOCK(0x0, 0xf) 03:35:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000007fffffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00^', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000feffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:51 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/zero\x00', 0xffffffff7ffffffe, 0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340)=0x0, &(0x7f0000001380)) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='.\x00', 0x7, 0x3, &(0x7f0000000140)=[{&(0x7f0000000100)="c0904c2ddea3197cefa5abca8054b605478338f0e39798ec5792eced1b5f56106256a238a1dd1268d964", 0x2a, 0x7}, {&(0x7f0000000200)="e8d1aef3eb194bf67d4144201e7f3821ef0cc7c1a7d3580a29b7ee5afcb17051e96ae31132e5a6aa547b4891c50ca3c31d787398062ac28c87ef52ecc393851460e58a944d307c0d4455686c401e5dcf92bb1dc1ce5f9f3cda30bfc3ace342fa5af105840fd683e8a57e410af4d98da8ba0f7aabd92566d1a1ff4100e1bb9093e73d7b612261c3da4a52d19e7a084268b9d29bd228d796e1a7dca85a7f814f38a5d1a0a81e2dc85c0ab73a4d7478b157dbc061e5b0803661c310140d33271f4f58c41eaa2b51bfa72c3ff46c0ee90e072678102cc82076758780fa", 0xdb, 0x2}, {&(0x7f0000000300)="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", 0x1000, 0x200}], 0x801040, &(0x7f00000013c0)={[{@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@largeio='largeio'}, {@pquota='pquota'}, {@filestreams='filestreams'}, {@nogrpid='nogrpid'}, {@logbufs={'logbufs', 0x3d, 0x8}}, {@dax='dax'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@dont_appraise='dont_appraise'}, {@fsname={'fsname', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) getpriority(0x2, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 03:35:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000003f000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a001c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:52 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f", 0x1b, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00fdffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000040000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:52 executing program 0: r0 = socket(0x1, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f00000056c0)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_IFNAME={0x14, 0x4, 'C\x00\x00\x001\x00'}]}, 0x34}}, 0x0) 03:35:52 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8e", 0x28, 0x0, &(0x7f0000000000)=@abs, 0x6e) [ 825.278760] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 825.292685] print_req_error: I/O error, dev loop4, sector 128 03:35:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/zero\x00', 0xffffffff7ffffffe, 0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340)=0x0, &(0x7f0000001380)) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='.\x00', 0x7, 0x3, &(0x7f0000000140)=[{&(0x7f0000000100)="c0904c2ddea3197cefa5abca8054b605478338f0e39798ec5792eced1b5f56106256a238a1dd1268d964", 0x2a, 0x7}, {&(0x7f0000000200)="e8d1aef3eb194bf67d4144201e7f3821ef0cc7c1a7d3580a29b7ee5afcb17051e96ae31132e5a6aa547b4891c50ca3c31d787398062ac28c87ef52ecc393851460e58a944d307c0d4455686c401e5dcf92bb1dc1ce5f9f3cda30bfc3ace342fa5af105840fd683e8a57e410af4d98da8ba0f7aabd92566d1a1ff4100e1bb9093e73d7b612261c3da4a52d19e7a084268b9d29bd228d796e1a7dca85a7f814f38a5d1a0a81e2dc85c0ab73a4d7478b157dbc061e5b0803661c310140d33271f4f58c41eaa2b51bfa72c3ff46c0ee90e072678102cc82076758780fa", 0xdb, 0x2}, {&(0x7f0000000300)="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", 0x1000, 0x200}], 0x801040, &(0x7f00000013c0)={[{@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@largeio='largeio'}, {@pquota='pquota'}, {@filestreams='filestreams'}, {@nogrpid='nogrpid'}, {@logbufs={'logbufs', 0x3d, 0x8}}, {@dax='dax'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@dont_appraise='dont_appraise'}, {@fsname={'fsname', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) getpriority(0x2, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 03:35:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000400004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:52 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39", 0x2f, 0x0, &(0x7f0000000000)=@abs, 0x6e) 03:35:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00v', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:52 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f00000004c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x99b9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000002c0), &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000240)=ANY=[], &(0x7f0000000480)) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x0, 0x200, 0x0, 0x401, 0x8, 0x3553800000, 0x7f}) r2 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={"6272696467653000000100"}) accept4$llc(0xffffffffffffffff, &(0x7f0000000540)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000580)=0x10, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'bridge0\x00\x00\x00\x00t\x00', 0xfffffffffffffffd}) r3 = syz_open_pts(r0, 0x200) ioctl$FICLONE(r3, 0x40049409, r3) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f00000000c0)={'erspan0\x00', {0x2, 0x4e20, @rand_addr=0x1}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='/dev/rfkill\x00', r0}, 0x10) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{}, {}]}) 03:35:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000fffffffb4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:52 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/zero\x00', 0xffffffff7ffffffe, 0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340)=0x0, &(0x7f0000001380)) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='.\x00', 0x7, 0x3, &(0x7f0000000140)=[{&(0x7f0000000100)="c0904c2ddea3197cefa5abca8054b605478338f0e39798ec5792eced1b5f56106256a238a1dd1268d964", 0x2a, 0x7}, {&(0x7f0000000200)="e8d1aef3eb194bf67d4144201e7f3821ef0cc7c1a7d3580a29b7ee5afcb17051e96ae31132e5a6aa547b4891c50ca3c31d787398062ac28c87ef52ecc393851460e58a944d307c0d4455686c401e5dcf92bb1dc1ce5f9f3cda30bfc3ace342fa5af105840fd683e8a57e410af4d98da8ba0f7aabd92566d1a1ff4100e1bb9093e73d7b612261c3da4a52d19e7a084268b9d29bd228d796e1a7dca85a7f814f38a5d1a0a81e2dc85c0ab73a4d7478b157dbc061e5b0803661c310140d33271f4f58c41eaa2b51bfa72c3ff46c0ee90e072678102cc82076758780fa", 0xdb, 0x2}, {&(0x7f0000000300)="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", 0x1000, 0x200}], 0x801040, &(0x7f00000013c0)={[{@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@largeio='largeio'}, {@pquota='pquota'}, {@filestreams='filestreams'}, {@nogrpid='nogrpid'}, {@logbufs={'logbufs', 0x3d, 0x8}}, {@dax='dax'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_eq={'uid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@dont_appraise='dont_appraise'}, {@fsname={'fsname', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) getpriority(0x2, r2) 03:35:52 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefba", 0x32, 0x0, &(0x7f0000000000)=@abs, 0x6e) [ 825.711662] bridge0: port 2(bridge_slave_1) entered disabled state 03:35:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000060000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 825.769542] EXT4-fs: 12 callbacks suppressed [ 825.769555] EXT4-fs (sda1): re-mounted. Opts: 03:35:53 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae33f", 0x34, 0x0, &(0x7f0000000000)=@abs, 0x6e) [ 825.891675] EXT4-fs (sda1): re-mounted. Opts: 03:35:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000001c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000a000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:53 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/zero\x00', 0xffffffff7ffffffe, 0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340)=0x0, &(0x7f0000001380)) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='.\x00', 0x7, 0x3, &(0x7f0000000140)=[{&(0x7f0000000100)="c0904c2ddea3197cefa5abca8054b605478338f0e39798ec5792eced1b5f56106256a238a1dd1268d964", 0x2a, 0x7}, {&(0x7f0000000200)="e8d1aef3eb194bf67d4144201e7f3821ef0cc7c1a7d3580a29b7ee5afcb17051e96ae31132e5a6aa547b4891c50ca3c31d787398062ac28c87ef52ecc393851460e58a944d307c0d4455686c401e5dcf92bb1dc1ce5f9f3cda30bfc3ace342fa5af105840fd683e8a57e410af4d98da8ba0f7aabd92566d1a1ff4100e1bb9093e73d7b612261c3da4a52d19e7a084268b9d29bd228d796e1a7dca85a7f814f38a5d1a0a81e2dc85c0ab73a4d7478b157dbc061e5b0803661c310140d33271f4f58c41eaa2b51bfa72c3ff46c0ee90e072678102cc82076758780fa", 0xdb, 0x2}, {&(0x7f0000000300)="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", 0x1000, 0x200}], 0x801040, &(0x7f00000013c0)={[{@noquota='noquota'}, {@pqnoenforce='pqnoenforce'}, {@largeio='largeio'}, {@pquota='pquota'}, {@filestreams='filestreams'}, {@nogrpid='nogrpid'}, {@logbufs={'logbufs', 0x3d, 0x8}}, {@dax='dax'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@uid_eq={'uid', 0x3d, r0}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x7fffffff}}, {@dont_appraise='dont_appraise'}, {@fsname={'fsname', 0x3d, '/dev/zero\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}]}) getpriority(0x2, 0x0) 03:35:53 executing program 5: r0 = socket(0x40000000002, 0x3, 0x42) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x83, 0x1f4) sendto$unix(r0, &(0x7f0000000180)="1d9b000000007675d706d94e590291c9900d3be5299d0affffff7f00000000234c4104bfcca43d8edd718e9f981c39daefbae3", 0x33, 0x0, &(0x7f0000000000)=@abs, 0x6e) [ 826.213962] print_req_error: I/O error, dev loop4, sector 128 03:35:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a006c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:53 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/zero\x00', 0xffffffff7ffffffe, 0x0) getresuid(&(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380)) getpriority(0x2, 0x0) [ 826.336217] EXT4-fs (sda1): re-mounted. Opts: [ 826.462965] EXT4-fs (sda1): re-mounted. Opts: [ 826.868089] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.874652] bridge0: port 2(bridge_slave_1) entered forwarding state [ 826.889698] device bridge0 entered promiscuous mode [ 826.895749] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 826.991021] bridge0: port 2(bridge_slave_1) entered disabled state [ 827.019795] device bridge0 left promiscuous mode 03:35:54 executing program 0: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:35:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)) 03:35:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000100100000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00?', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:54 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/zero\x00', 0xffffffff7ffffffe, 0x0) getpriority(0x2, 0x0) 03:35:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000007400004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 827.266015] bridge0: port 2(bridge_slave_1) entered blocking state [ 827.272651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 827.280961] device bridge0 entered promiscuous mode [ 827.287543] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 827.366050] EXT4-fs (sda1): re-mounted. Opts: 03:35:54 executing program 5: r0 = memfd_create(&(0x7f0000000100)="656f307573657244aa19bf93948d77bd10892c924129aecd10817ae04395266dc3165804ff3d37999d88d97352ff67d2eb22016b6eb304a64fc63ac52de48d0000000000000000000000000000", 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000380)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f02acc7edbcd7a071fb35331ce39c5a0bcb98a3e1f46fd51b139d755efce9768b84ea75c2ff4b3c85caef374d126a56fa4743af7ef55c846bfe7dd16072d260ffddcc8a6d22e02f44d6a360524b86b51a4b58afca35f12201adb024bfb20fbd364e78a232fbef31595029f755740ab15e173dc73ba964a4189007c7c40db8fb4b64dd8ec4d366") sendfile(r0, r1, &(0x7f00000000c0), 0x80000002) 03:35:54 executing program 1: getpriority(0x2, 0x0) [ 827.425486] EXT4-fs (sda1): re-mounted. Opts: [ 827.433691] print_req_error: I/O error, dev loop4, sector 128 03:35:54 executing program 0: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:35:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000800004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00520d0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:54 executing program 0: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:35:54 executing program 0: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:35:54 executing program 1: getpriority(0x0, 0x0) 03:35:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000c0ed00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:54 executing program 0: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:35:54 executing program 1: getpriority(0x0, 0x0) [ 827.790302] EXT4-fs (sda1): re-mounted. Opts: 03:35:54 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80}}], 0x0, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='io\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 03:35:54 executing program 0: perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) [ 827.899916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 03:35:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00=', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000200004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:55 executing program 0: r0 = inotify_init() ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:35:55 executing program 1: getpriority(0x0, 0x0) 03:35:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000010204d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:55 executing program 5: ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = inotify_init() perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 828.109474] EXT4-fs (sda1): re-mounted. Opts: [ 828.133692] print_req_error: I/O error, dev loop4, sector 128 03:35:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000440)) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000240)="0f21abd9f6b8fc0d8ec03e0cfcd8fa2e3e0f00d9baf80c66b89c39008866efbafc0c66b80a5e000066efbaf80c66b884929d8f66efbafc0c66b8e100000066eff2f30f19809988260f06", 0x4a}], 0x1, 0x0, &(0x7f00000001c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000000)={0x0, 0x0, &(0x7f000002c000/0xf000)=nil}) [ 828.203597] EXT4-fs (sda1): re-mounted. Opts: 03:35:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:35:55 executing program 0: inotify_init() ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 03:35:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0007000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000180)) 03:35:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00_', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000003f0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:55 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x1, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB="87"], 0x0, 0x0, &(0x7f0000012fc7)}) [ 828.436915] kvm: emulating exchange as write 03:35:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 828.486943] EXT4-fs (sda1): re-mounted. Opts: [ 828.532897] binder: 16027:16028 unknown command 135 03:35:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000001004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 828.582331] binder: 16027:16028 ioctl c0306201 20012000 returned -22 [ 828.582436] binder: 16030:16035 unknown command 135 [ 828.654303] print_req_error: I/O error, dev loop4, sector 128 03:35:55 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x10001, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) [ 828.699295] binder: 16030:16035 ioctl c0306201 20012000 returned -22 03:35:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000000001d", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f0000000100), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mount(&(0x7f0000000680)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 03:35:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000440)) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000240)="0f21abd9f6b8fc0d8ec03e0cfcd8fa2e3e0f00d9baf80c66b89c39008866efbafc0c66b80a5e000066efbaf80c66b884929d8f66efbafc0c66b8e100000066eff2f30f19809988260f06", 0x4a}], 0x1, 0x0, &(0x7f00000001c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000000)={0x0, 0x0, &(0x7f000002c000/0xf000)=nil}) 03:35:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a005e1c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:56 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x12, 0x23, 0x4, 0x400000000078}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f00000000c0), &(0x7f0000000040)=""/70}, 0x18) sendto$inet(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0x10) 03:35:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000f5ffffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x009', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00d2f873574f257e0a00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00$', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:56 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00f6ffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000440)) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000240)="0f21abd9f6b8fc0d8ec03e0cfcd8fa2e3e0f00d9baf80c66b89c39008866efbafc0c66b80a5e000066efbaf80c66b884929d8f66efbafc0c66b8e100000066eff2f30f19809988260f06", 0x4a}], 0x1, 0x0, &(0x7f00000001c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000000)={0x0, 0x0, &(0x7f000002c000/0xf000)=nil}) 03:35:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000094d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00N', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000002300004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000070000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00p', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000003000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:57 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000080)='lo.\x00', 0x0, 0x0, &(0x7f0000000100)) openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x3f}, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x1c9c380}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) [ 830.777915] EXT4-fs: 9 callbacks suppressed [ 830.777928] EXT4-fs (sda1): re-mounted. Opts: 03:35:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00030000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000fff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000940)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000340), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x14, 0x0, 0x200}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mount$overlay(0x404000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}]}) 03:35:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x000', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000fffffe00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 831.277340] EXT4-fs (sda1): re-mounted. Opts: 03:35:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00100000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00|', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000180)) 03:35:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000023000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 831.697832] EXT4-fs (sda1): re-mounted. Opts: 03:35:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f0000000180)="9a0c9e00002601c4e10c54a498dcf97fe90f01150000000066baf80cb88ce17586ef66bafc0cec9a00600000400066b8e9000f00d00f01df0f18d08086bc0e00008c0f00d6", 0x45}], 0x544, 0x0, &(0x7f0000000180), 0x1f1) 03:35:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000001f0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000480080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:58 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:59 executing program 5: setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000004000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 831.990238] EXT4-fs (sda1): re-mounted. Opts: [ 832.059310] EXT4-fs (sda1): re-mounted. Opts: 03:35:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:59 executing program 5: setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000018", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:59 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000740), 0x4) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000200)=[@flat], &(0x7f0000000240)}}], 0x0, 0x0, &(0x7f00000003c0)}) 03:35:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000fffffff400004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 832.233367] binder: 16380:16382 transaction failed 29189/-22, size 24-0 line 2834 03:35:59 executing program 5: setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 832.306768] binder: 16380:16388 transaction failed 29189/-22, size 24-0 line 2834 03:35:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000060000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 832.349499] binder: undelivered TRANSACTION_ERROR: 29189 [ 832.382985] EXT4-fs (sda1): re-mounted. Opts: [ 832.428643] binder: undelivered TRANSACTION_ERROR: 29189 [ 832.445297] EXT4-fs (sda1): re-mounted. Opts: 03:35:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) setsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f00000000c0)=0xfffffffffffffffd, 0x4) sendmmsg$unix(r0, &(0x7f0000005240)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000540), 0x0, &(0x7f0000000680)}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000004e40)=[{{&(0x7f0000000000)=@llc, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000000080)=""/9, 0x9}}], 0x37a, 0x0, &(0x7f00000050c0)={0x77359400}) 03:35:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00c', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:35:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:59 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:35:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000006c00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000ffffffffffffffff4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:35:59 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 832.780133] EXT4-fs (sda1): re-mounted. Opts: 03:35:59 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:00 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 832.883160] EXT4-fs (sda1): re-mounted. Opts: 03:36:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000011", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000004800004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 833.249152] EXT4-fs (sda1): re-mounted. Opts: [ 833.274110] print_req_error: I/O error, dev loop4, sector 128 03:36:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @loopback}, 0x10) sendmmsg(r0, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f00000005c0)=[{0x10, 0x0, 0x1}], 0x10, 0x40000}, 0x7f}], 0x1, 0x4) 03:36:00 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000ffffff8c4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00[', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000200000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 833.694655] print_req_error: I/O error, dev loop4, sector 128 03:36:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:00 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:00 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000680)=0x82, 0xffffffdc) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='reno\x00', 0x5) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x921b527a62bfd8af) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0xff9a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000280)="0e") 03:36:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0005000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00fffffe000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000fffffff5000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:01 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000009000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000001a0ffffffff00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000740080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:01 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000fffffff54d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:01 executing program 1: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000080), 0x0, &(0x7f00000003c0)={0x77359400}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$setregs(0x8000000000f, r0, 0x0, &(0x7f0000000240)="7fec9ac7becafd200e5df3dc46d1dc48d9dbb2dd3af7773a5d90970b6c171c6050eb9eb27a417dbd5f2f6bb9f8b7af") ptrace$getregs(0xe, r0, 0x0, &(0x7f00000002c0)=""/87) 03:36:01 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000ffffff9700004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00}', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000fbffffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:01 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000a7e254f5773f8d200004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00j', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:02 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x6004}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x3000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, 0x7}, 0x18) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000140)=ANY=[@ANYBLOB='&']) dup3(r0, r1, 0x0) [ 835.193430] print_req_error: I/O error, dev loop4, sector 128 03:36:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000008cffffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:02 executing program 1: io_setup(0x4, &(0x7f0000000040)) 03:36:02 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x6004}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x3000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, 0x7}, 0x18) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000140)=ANY=[@ANYBLOB='&']) dup3(r0, r1, 0x0) 03:36:02 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000005e1c00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00!', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000044d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:02 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x6004}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x3000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, 0x7}, 0x18) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000140)=ANY=[@ANYBLOB='&']) dup3(r0, r1, 0x0) 03:36:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000000000000fff4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 835.828769] EXT4-fs: 11 callbacks suppressed [ 835.828781] EXT4-fs (sda1): re-mounted. Opts: 03:36:03 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000440), 0xffffffffffffffba, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) 03:36:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00y', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00004c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:03 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x6004}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x3000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, 0x7}, 0x18) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000140)=ANY=[@ANYBLOB='&']) dup3(r0, r1, 0x0) [ 836.176729] device lo left promiscuous mode [ 836.209657] EXT4-fs (sda1): re-mounted. Opts: 03:36:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000024d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 836.253051] print_req_error: I/O error, dev loop4, sector 128 [ 836.276141] EXT4-fs (sda1): re-mounted. Opts: 03:36:03 executing program 0: socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:03 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x6004}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x3000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, 0x7}, 0x18) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)) dup3(r0, r1, 0x0) 03:36:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00F', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00231f7dc339e55e1c00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:03 executing program 0: socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:03 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x6004}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x3000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, 0x7}, 0x18) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)) dup3(r0, r1, 0x0) [ 836.614005] EXT4-fs (sda1): re-mounted. Opts: [ 836.633514] print_req_error: I/O error, dev loop4, sector 128 [ 836.667230] EXT4-fs (sda1): re-mounted. Opts: 03:36:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000001a0000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000001c00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00i', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:04 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x6004}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x3000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, 0x7}, 0x18) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) dup3(r0, r1, 0x0) 03:36:04 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) 03:36:04 executing program 0: socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000005e1c000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:04 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x6004}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x3000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, 0x7}, 0x18) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) dup3(r0, r1, 0x0) [ 837.023159] EXT4-fs (sda1): re-mounted. Opts: 03:36:04 executing program 0: r0 = socket(0xa, 0x10000000000003, 0x9) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0xfffffffffffffffd}) [ 837.092404] EXT4-fs (sda1): re-mounted. Opts: 03:36:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000000001b", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 837.194289] print_req_error: I/O error, dev loop4, sector 128 [ 837.229909] bridge0: port 2(bridge_slave_1) entered disabled state 03:36:04 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) 03:36:04 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x6004}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x3000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, 0x7}, 0x18) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) dup3(r0, r1, 0x0) [ 837.246146] device bridge0 left promiscuous mode 03:36:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000fff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000fcfdffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) setsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f00000000c0)=0xfffffffffffffffd, 0x4) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005240), 0x0, 0x0) 03:36:04 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x6004}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x3000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, 0x7}, 0x18) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000000000)) dup3(r0, 0xffffffffffffffff, 0x0) 03:36:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00.', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_mreq(r1, 0x0, 0x27, &(0x7f00000005c0)={@multicast1}, 0x8) r2 = gettid() wait4(0x0, &(0x7f00000003c0), 0x80000000, &(0x7f0000000400)) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x14) ptrace$cont(0x1f, r2, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ptrace$cont(0x20, r2, 0x0, 0x7) writev(r3, &(0x7f0000000a80)=[{&(0x7f0000000000)="80", 0x1}], 0x1) 03:36:04 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x6004}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x3000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, 0x7}, 0x18) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) dup3(0xffffffffffffffff, r0, 0x0) [ 838.008883] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.015371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 838.041707] device bridge0 entered promiscuous mode [ 838.057974] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 838.069789] bridge0: port 2(bridge_slave_1) entered disabled state 03:36:05 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x6004}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x3000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400}) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)) dup3(r0, r1, 0x0) [ 838.105533] EXT4-fs (sda1): re-mounted. Opts: [ 838.113391] device bridge0 left promiscuous mode [ 838.175425] EXT4-fs (sda1): re-mounted. Opts: 03:36:05 executing program 0: r0 = socket(0xa, 0x10000000000003, 0x9) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0xfffffffffffffffd}) 03:36:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000fffffffb000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000110000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x001', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:05 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)) dup3(r0, r1, 0x0) 03:36:05 executing program 1: clone(0x100002102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080)={0x95cc}, 0x8) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x20000, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r3, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'gre0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}}) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000480)=""/196) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1e2209e924c5de39, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r4, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000067dd970000"], 0x1) [ 838.549057] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.555565] bridge0: port 2(bridge_slave_1) entered forwarding state [ 838.564725] device bridge0 entered promiscuous mode [ 838.571900] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 838.750465] bridge0: port 2(bridge_slave_1) entered disabled state [ 838.768305] EXT4-fs (sda1): re-mounted. Opts: [ 838.789577] device bridge0 left promiscuous mode 03:36:05 executing program 5: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)) dup3(r0, r1, 0x0) 03:36:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00ffffffffffff070000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000014d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:06 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)) dup3(r0, r1, 0x0) 03:36:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\b', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000003f00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:06 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 03:36:06 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)) dup3(r0, r1, 0x0) 03:36:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000c0ed0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:06 executing program 1: r0 = socket(0xa, 0x10000000000003, 0x9) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0xfffffffffffffffd}) 03:36:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000004", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000020000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 839.624573] bridge0: port 2(bridge_slave_1) entered blocking state [ 839.631071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 839.640685] device bridge0 entered promiscuous mode [ 839.649821] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 839.663994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 839.760334] bridge0: port 2(bridge_slave_1) entered disabled state [ 839.767161] bridge0: port 1(bridge_slave_0) entered disabled state 03:36:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00001c00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x800009) 03:36:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000000000)) dup3(r0, r1, 0x0) 03:36:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00w', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000fffffdfd000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x800009) 03:36:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000000000)) dup3(r0, r1, 0x0) 03:36:07 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000006800004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000230000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 840.757057] bridge0: port 2(bridge_slave_1) entered blocking state [ 840.763576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 840.770567] bridge0: port 1(bridge_slave_0) entered blocking state [ 840.777046] bridge0: port 1(bridge_slave_0) entered forwarding state [ 840.802305] device bridge0 entered promiscuous mode 03:36:07 executing program 1: r0 = socket(0xa, 0x10000000000003, 0x9) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0xfffffffffffffffd}) 03:36:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x800009) 03:36:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00X', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:07 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0xaf01, &(0x7f0000000000)) dup3(r0, r1, 0x0) 03:36:08 executing program 5: socket$inet6(0xa, 0x2, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) dup3(0xffffffffffffffff, r0, 0x0) 03:36:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x800009) 03:36:08 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000001a00000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 840.979334] EXT4-fs: 7 callbacks suppressed [ 840.979355] EXT4-fs (sda1): re-mounted. Opts: [ 841.054966] EXT4-fs (sda1): re-mounted. Opts: 03:36:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\t', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:08 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)) dup3(r0, 0xffffffffffffffff, 0x0) 03:36:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000054d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 841.154447] bridge0: port 2(bridge_slave_1) entered disabled state [ 841.160947] bridge0: port 1(bridge_slave_0) entered disabled state 03:36:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$unix(0x1, 0x0, 0x0) bind$unix(r1, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000340), 0x800009) [ 841.205070] device bridge0 left promiscuous mode 03:36:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) [ 841.478353] EXT4-fs (sda1): re-mounted. Opts: [ 841.566503] EXT4-fs (sda1): re-mounted. Opts: 03:36:09 executing program 1: r0 = socket(0xa, 0x10000000000003, 0x9) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={"6272696467653000000100"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0xfffffffffffffffd}) 03:36:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$unix(0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 03:36:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000001020000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00007400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:09 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x6, 0x1, 0x4, 0xffffffff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0xb50b, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x4, 0x4, 0x0, 0xcb, 0x0, 0x8b4, 0x0, 0x0, 0x0, 0x401, 0x3f, 0x59b94f8e, 0x0, 0x0, 0x20, 0x0, 0xffff, 0x4, @perf_config_ext={0x1}, 0x0, 0x9, 0x9, 0x5, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160d49cb6cce76c27289a4f9d097354aaa5860d2383df87526baa184d90bb7729366c16bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374d090042a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000440)={'bridge_slave_1\x00'}) 03:36:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000200080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 841.915375] bridge0: port 2(bridge_slave_1) entered blocking state [ 841.921832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 841.928639] bridge0: port 1(bridge_slave_0) entered blocking state [ 841.935080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 841.944397] device bridge0 entered promiscuous mode 03:36:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$unix(0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 03:36:09 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x6, 0x1, 0x4, 0xffffffff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0xb50b, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x4, 0x4, 0x0, 0xcb, 0x0, 0x8b4, 0x0, 0x0, 0x0, 0x401, 0x3f, 0x59b94f8e, 0x0, 0x0, 0x20, 0x0, 0xffff, 0x4, @perf_config_ext={0x1}, 0x0, 0x9, 0x9, 0x5, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="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", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000440)={'bridge_slave_1\x00'}) [ 842.113321] EXT4-fs (sda1): re-mounted. Opts: [ 842.118281] bridge0: port 2(bridge_slave_1) entered disabled state [ 842.124873] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.175358] print_req_error: I/O error, dev loop4, sector 128 [ 842.181597] device bridge0 left promiscuous mode [ 842.225866] EXT4-fs (sda1): re-mounted. Opts: 03:36:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="007a000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:09 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$unix(0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 03:36:09 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00040000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:09 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x6, 0x1, 0x4, 0xffffffff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0xb50b, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x4, 0x4, 0x0, 0xcb, 0x0, 0x8b4, 0x0, 0x0, 0x0, 0x401, 0x3f, 0x59b94f8e, 0x0, 0x0, 0x20, 0x0, 0xffff, 0x4, @perf_config_ext={0x1}, 0x0, 0x9, 0x9, 0x5, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="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", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000440)={'bridge_slave_1\x00'}) [ 842.619196] EXT4-fs (sda1): re-mounted. Opts: [ 842.664248] print_req_error: I/O error, dev loop4, sector 128 [ 842.705654] EXT4-fs (sda1): re-mounted. Opts: 03:36:10 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000040)=""/4) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x441, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000240)=0xc) write$P9_RVERSION(r0, &(0x7f0000000100)={0x13, 0x65, 0xffff, 0x0, 0x6, '9P2000'}, 0x13) 03:36:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000edc0000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 843.193937] bridge0: port 2(bridge_slave_1) entered blocking state [ 843.200389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 843.207215] bridge0: port 1(bridge_slave_0) entered blocking state [ 843.213679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 843.235500] device bridge0 entered promiscuous mode 03:36:10 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x6, 0x1, 0x4, 0xffffffff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0xb50b, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x4, 0x4, 0x0, 0xcb, 0x0, 0x8b4, 0x0, 0x0, 0x0, 0x401, 0x3f, 0x59b94f8e, 0x0, 0x0, 0x20, 0x0, 0xffff, 0x4, @perf_config_ext={0x1}, 0x0, 0x9, 0x9, 0x5, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="2f007e574d000330809022cfde26555dc9ecfe1974406edad38364782d63b6612854b9e49dbdcaef718197e37e870a308b1e3a798fa788a46d3025ef933e51828ab675064e2adbe9126423b4a73d68fbe99c6db2f160d49cb6cce76c27289a4f9d097354aaa5860d2383df87526baa184d90bb7729366c16bc33d765e9bc2f882a13f3a9c1f60660bd4fd2fa31d2c0a775242289bce062d10d24ded5406918a66b2c75c43fe1ff458ae5cd9fec63039ba5a7b66a60ede5ccdabc7ee77660ef2358ccdff02226021384b0c235f114ed9ade92767aecc256acdeb610df42e7169f240357f735ae5fe29017e51e27252f48b95bfbbb3a865535298bdc36d71db635f41c57771db77aeaff883feb3dc3cc24bd3c036e396ad3af37945058839e812270bc40901fa654e7cc3292a82fc80c374d090042a1c2e9d3e2528e4fdac32bcaefe910ebd3b948a3bfebef5fa8d82473c7fbf3ec", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000440)={'bridge_slave_1\x00'}) 03:36:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x800009) 03:36:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00Q', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00fdfdffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:10 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x6, 0x1, 0x4, 0xffffffff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0xb50b, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x4, 0x4, 0x0, 0xcb, 0x0, 0x8b4, 0x0, 0x0, 0x0, 0x401, 0x3f, 0x59b94f8e, 0x0, 0x0, 0x20, 0x0, 0xffff, 0x4, @perf_config_ext={0x1}, 0x0, 0x9, 0x9, 0x5, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="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", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)) 03:36:10 executing program 0: bind$unix(0xffffffffffffffff, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000340), 0x800009) [ 843.469927] EXT4-fs (sda1): re-mounted. Opts: [ 843.471554] audit: type=1804 audit(2000000170.560:117): pid=17327 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir382191291/syzkaller.I1TE3H/1632/file0" dev="sda1" ino=17677 res=1 [ 843.553594] print_req_error: I/O error, dev loop4, sector 128 [ 843.591722] EXT4-fs (sda1): re-mounted. Opts: 03:36:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x441, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f0000000000)=0x6e) stat(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)) lstat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400)) write$P9_RSTATu(r0, &(0x7f0000000480)={0x86, 0x7d, 0x0, {{0x0, 0x5a, 0x0, 0x0, {}, 0x0, 0x2, 0x0, 0x0, 0x17, 'trusted.overlay.opaque\x00', 0x2, 'y\x00', 0x5, 'bdev,', 0x9, '{+bdev%x\t'}, 0x17, 'trusted.overlay.opaque\x00'}}, 0x86) [ 843.649347] audit: type=1804 audit(2000000170.600:118): pid=17331 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir382191291/syzkaller.I1TE3H/1632/file0" dev="sda1" ino=17677 res=1 03:36:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00A', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:10 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x800009) 03:36:10 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x6, 0x1, 0x4, 0xffffffff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, 0xb50b, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x4, 0x4, 0x0, 0xcb, 0x0, 0x8b4, 0x0, 0x0, 0x0, 0x401, 0x3f, 0x59b94f8e, 0x0, 0x0, 0x20, 0x0, 0xffff, 0x4, @perf_config_ext={0x1}, 0x0, 0x9, 0x9, 0x5, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, &(0x7f00000001c0)) 03:36:10 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000000d5200004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000008000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:11 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x441, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000240)=0xc) write$P9_RRENAME(r0, &(0x7f0000000000)={0x7}, 0x7) 03:36:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bind$unix(0xffffffffffffffff, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 03:36:11 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="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", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)) 03:36:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000010", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000010000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:11 executing program 1: r0 = epoll_create1(0x80006) r1 = socket(0x1d, 0x0, 0x1116) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0xfffffffe8000201f}) fsync(r1) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000100)=0x7, 0x4) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000380)={0x50000008}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r2, &(0x7f0000000600)=[{&(0x7f0000000480)=""/9, 0x9}, {&(0x7f00000004c0)=""/237, 0xed}, {&(0x7f00000005c0)=""/9, 0x9}], 0x3) flock(r0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000800)='trusted.overlay.upper\x00', &(0x7f0000000840)={0x0, 0xfb, 0x15, 0x1, 0x80000000, "d58c4e680426eb8d8b2e66cba6e42772"}, 0x15, 0x3) fcntl$getown(r3, 0x9) r4 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0xfffffffffffffffc, &(0x7f0000000000)={0x0, 0x6, 0x4}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000340)={0x3, &(0x7f0000000300)=[{0x9, 0xbbf8, 0x4, 0x2}, {0x2, 0x800, 0x4, 0x6}, {0x7, 0x1, 0x81, 0x2}]}, 0x8) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000002c0)=0x8, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000003c0)={0x109, 0x0, 0x8, 0x3, 0x5}, 0x14) getsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f0000000780), &(0x7f00000007c0)=0x4) ioctl$sock_ifreq(r3, 0x8921, &(0x7f0000000280)={'ipddp0\x00', @ifru_hwaddr=@remote}) mq_notify(r4, &(0x7f0000000140)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000040)="7be4d6b00202ca53878499e01146863a2e7c8ca45e1910e5eba6453bb6f234b5a1b1bca731970a74bfc8e1793749ea18156c9b8a615bfa2f506fcf44060d36e38f66f111149434d5139e416358ea33f34b4507cdc299f7868d5f186e6bd604", &(0x7f00000000c0)="3c5d8da40d1477844fc4c160b6004a90edc520a6935a49cf5da4c2b525d13146ed27d429c762a4b0e9aaed82555cd1ae800d"}}) ppoll(&(0x7f00000001c0)=[{r4, 0x8000}, {0xffffffffffffffff, 0x420}], 0x2, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240)={0x9}, 0x8) renameat2(r3, &(0x7f0000000400)='./file0\x00', r2, &(0x7f0000000440)='./file0\x00', 0x0) mq_timedsend(r4, &(0x7f00000e6000), 0x0, 0xe7, &(0x7f0000e0b000)) io_setup(0x800e7, &(0x7f00000006c0)) 03:36:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000fffffe004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bind$unix(0xffffffffffffffff, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 03:36:11 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="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", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)) 03:36:11 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00fffffff50000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:11 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="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", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)) 03:36:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bind$unix(0xffffffffffffffff, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 03:36:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000234d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:11 executing program 5: openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="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", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020660b, &(0x7f00000001c0)) 03:36:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f000000f000)=@abs={0x0, 0x0, 0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x800009) 03:36:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000600000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x2}, 0x18) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0x7, 0x4) sendto$inet6(r1, &(0x7f0000000440), 0xfeef, 0x20000007, &(0x7f0000000040)={0xa, 0x2}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:36:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0006000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:12 executing program 5: openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)="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", 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, &(0x7f00000001c0)) 03:36:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f000000f000)=@abs={0x0, 0x0, 0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x800009) 03:36:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000001c5e0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:12 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00102000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:12 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x4000001000008912, &(0x7f0000000000)="0a5c2d023c126285718070") perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f000000f000)=@abs={0x0, 0x0, 0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x800009) [ 845.474157] print_req_error: I/O error, dev loop4, sector 128 03:36:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00:', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000ffffffffffffff7f4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f000000f000)=@abs={0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x800009) 03:36:12 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x4000001000008912, &(0x7f0000000000)="0a5c2d023c126285718070") perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:13 executing program 1: 03:36:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00080000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f000000f000)=@abs={0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x800009) 03:36:13 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x4000001000008912, &(0x7f0000000000)="0a5c2d023c126285718070") perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000fffffdfc4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00I', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f000000f000)=@abs={0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x800009) [ 846.412459] EXT4-fs: 10 callbacks suppressed [ 846.412471] EXT4-fs (sda1): re-mounted. Opts: 03:36:13 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x4000001000008912, &(0x7f0000000000)="0a5c2d023c126285718070") perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:13 executing program 1: [ 846.497032] EXT4-fs (sda1): re-mounted. Opts: 03:36:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000000001a", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(0xffffffffffffffff, r1, &(0x7f0000000340), 0x800009) 03:36:13 executing program 1: 03:36:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000340), 0x800009) 03:36:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00020000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000fffffdfd4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:13 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x4000001000008912, &(0x7f0000000000)="0a5c2d023c126285718070") clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 846.843370] EXT4-fs (sda1): re-mounted. Opts: 03:36:14 executing program 1: [ 846.902143] EXT4-fs (sda1): re-mounted. Opts: 03:36:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="004c000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x0) 03:36:14 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x4000001000008912, &(0x7f0000000000)="0a5c2d023c126285718070") clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 847.054052] print_req_error: I/O error, dev loop4, sector 128 03:36:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a007a0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x0) 03:36:14 executing program 1: 03:36:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000f9fdffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f000000f000)=@abs={0x1, 0x0, 0x1}, 0x6e) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r2, &(0x7f0000000340), 0x0) 03:36:14 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x4000001000008912, &(0x7f0000000000)="0a5c2d023c126285718070") clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 847.339827] EXT4-fs (sda1): re-mounted. Opts: 03:36:14 executing program 1: [ 847.453190] EXT4-fs (sda1): re-mounted. Opts: 03:36:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00fffffffd0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:14 executing program 0: 03:36:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000680080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:14 executing program 1: 03:36:14 executing program 5: socket$inet6(0xa, 0x803, 0x3) perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:14 executing program 0: 03:36:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000007ffffffffffff4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:14 executing program 1: [ 847.793140] print_req_error: I/O error, dev loop4, sector 128 03:36:14 executing program 0: [ 847.868288] EXT4-fs (sda1): re-mounted. Opts: 03:36:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00fffffffb0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:15 executing program 5: socket$inet6(0xa, 0x803, 0x3) perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 847.966392] EXT4-fs (sda1): re-mounted. Opts: 03:36:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00>', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:15 executing program 0: 03:36:15 executing program 1: 03:36:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000fffffdfc000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:15 executing program 0: [ 848.235599] EXT4-fs (sda1): re-mounted. Opts: 03:36:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00c0ed00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 848.345724] EXT4-fs (sda1): re-mounted. Opts: 03:36:15 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:15 executing program 1: 03:36:15 executing program 0: 03:36:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00R', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:15 executing program 1: 03:36:15 executing program 0: 03:36:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000005000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00fbffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:15 executing program 0: 03:36:15 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x0, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:15 executing program 0: 03:36:15 executing program 1: 03:36:16 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x0, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x005', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:16 executing program 0: 03:36:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0097ffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:16 executing program 1: 03:36:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000020100000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:16 executing program 0: 03:36:16 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x0, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:16 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) 03:36:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000fffffdfc00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:16 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha224-ssse3,ctr-camellia-asm)\x00'}, 0x58) 03:36:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000012", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:16 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:16 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet6(0xa, 0x803, 0x7) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000180)=0x5, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:36:16 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(sha224-ssse3,ctr-camellia-asm)\x00'}, 0x58) 03:36:16 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80}}], 0x0, 0x0, &(0x7f0000003280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='io\x00') preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 03:36:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000003000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:16 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r2 = dup(r1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r3, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000140)) clone(0xb102001fff, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) write$P9_RLOPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000000)={0x0, @aes256, 0x0, "4dd97b9661dcb76d"}) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[], 0x0) close(r0) 03:36:16 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 849.723771] print_req_error: I/O error, dev loop4, sector 128 03:36:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00n', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000fffffdfd00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000000000005e1c4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:17 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00050000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="000000007f", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 850.343996] print_req_error: I/O error, dev loop4, sector 128 03:36:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$unix(0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 03:36:17 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000002000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00070000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 850.597589] cgroup: fork rejected by pids controller in /syz0 03:36:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00w', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00r', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 850.733286] print_req_error: I/O error, dev loop4, sector 128 03:36:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$unix(0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 03:36:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000030000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:17 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00ffffff970000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:17 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0048000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00w', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$unix(0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 03:36:18 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) [ 851.118858] print_req_error: I/O error, dev loop4, sector 128 03:36:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000200000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000900000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$unix(0x1, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000340), 0x800009) 03:36:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00w', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:18 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x43a, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 03:36:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00\v', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 851.483520] print_req_error: I/O error, dev loop4, sector 128 03:36:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 03:36:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000001c000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:18 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00fffffdfd0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000200000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 851.666379] cgroup: fork rejected by pids controller in /syz5 03:36:18 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000340), 0x800009) [ 851.792668] EXT4-fs: 12 callbacks suppressed [ 851.792680] EXT4-fs (sda1): re-mounted. Opts: 03:36:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000001c5ee539c37d1f234d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000002000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:19 executing program 0: syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000400)={{0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x6004}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {0x0, 0x3000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4400}) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, 0x7}, 0x18) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) dup3(r0, r1, 0x0) [ 851.917730] EXT4-fs (sda1): re-mounted. Opts: 03:36:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0008000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00003f00000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:19 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x800009) 03:36:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000005e1c00004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(0xffffffffffffffff, r0, &(0x7f0000000340), 0x800009) [ 852.273724] EXT4-fs (sda1): re-mounted. Opts: 03:36:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000f4ffffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 852.353805] EXT4-fs (sda1): re-mounted. Opts: 03:36:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, 0xffffffffffffffff, &(0x7f0000000340), 0x800009) 03:36:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000060080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x0) 03:36:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00680000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000001c5ee539c37d1f234d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:19 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 852.784651] EXT4-fs (sda1): re-mounted. Opts: [ 852.852361] EXT4-fs (sda1): re-mounted. Opts: 03:36:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000001a0ffffffff4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x002', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x0) 03:36:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00f4ffffff0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:20 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000084d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:20 executing program 0: setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') sendfile(r0, r1, &(0x7f0000000340), 0x0) 03:36:20 executing program 0: r0 = socket$inet6(0xa, 0x0, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 853.327994] EXT4-fs (sda1): re-mounted. Opts: [ 853.417061] EXT4-fs (sda1): re-mounted. Opts: [ 853.434049] print_req_error: I/O error, dev loop4, sector 128 03:36:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:20 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a001c5ee539c37d1f2300004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00;', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:20 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:20 executing program 0: socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000001004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:20 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000010200000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:20 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a006c0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 853.916946] EXT4-fs (sda1): re-mounted. Opts: 03:36:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000090000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 854.020043] EXT4-fs (sda1): re-mounted. Opts: 03:36:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00h', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/49) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x3, 0x0, 0x1, r1}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) close(r3) shmctl$SHM_LOCK(0x0, 0xf) 03:36:21 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000008000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000fffffe0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:21 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/49) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x3, 0x0, 0x1, r1}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) close(r3) shmctl$SHM_LOCK(0x0, 0xf) 03:36:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000001000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0068000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/49) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x3, 0x0, 0x1, r1}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) close(r3) shmctl$SHM_LOCK(0x0, 0xf) 03:36:21 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00fffffff60000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000003f0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:22 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/49) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x3, 0x0, 0x1, r1}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) close(r3) 03:36:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0074000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:22 executing program 5: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000ffffffff4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000400000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/49) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x3, 0x0, 0x1, r1}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) 03:36:22 executing program 5: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000070080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/49) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x3, 0x0, 0x1, r1}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) 03:36:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000110004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000009000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:22 executing program 5: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:22 executing program 1: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00)', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/49) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0x3, 0x0, 0x1, r1}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) 03:36:23 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00001c5ee539c37d1f23004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 855.975929] print_req_error: I/O error, dev loop4, sector 128 03:36:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000040)=""/49) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) 03:36:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) 03:36:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000004004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:23 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00<', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) 03:36:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000102000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) r0 = socket$vsock_stream(0x28, 0x1, 0x0) close(r0) 03:36:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) r0 = socket$vsock_stream(0x28, 0x1, 0x0) close(r0) 03:36:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) r0 = socket$vsock_stream(0x28, 0x1, 0x0) close(r0) 03:36:23 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$vsock_stream(0x28, 0x1, 0x0) close(r0) 03:36:24 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$vsock_stream(0x28, 0x1, 0x0) close(r0) [ 856.963677] print_req_error: I/O error, dev loop4, sector 128 [ 856.973398] EXT4-fs: 14 callbacks suppressed [ 856.973410] EXT4-fs (sda1): re-mounted. Opts: 03:36:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00L', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000a0010000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 857.283294] EXT4-fs (sda1): re-mounted. Opts: 03:36:25 executing program 5: r0 = socket$inet6(0xa, 0x0, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00f', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000204d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x0, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 858.209897] EXT4-fs (sda1): re-mounted. Opts: [ 858.253276] print_req_error: I/O error, dev loop4, sector 128 03:36:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) [ 858.294980] EXT4-fs (sda1): re-mounted. Opts: 03:36:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000fffffdf9000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00Y', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 858.476042] IPVS: ftp: loaded support on port[0] = 21 03:36:25 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000004004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 858.607802] EXT4-fs (sda1): re-mounted. Opts: [ 858.702413] EXT4-fs (sda1): re-mounted. Opts: 03:36:26 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$vsock_stream(0x28, 0x1, 0x0) close(r0) 03:36:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000231f7dc339e55e1c004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000400000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000204d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 859.333761] print_req_error: I/O error, dev loop1, sector 128 [ 859.456069] IPVS: ftp: loaded support on port[0] = 21 [ 861.924633] device bridge_slave_1 left promiscuous mode [ 861.930197] bridge0: port 2(bridge_slave_1) entered disabled state [ 861.993541] device bridge_slave_0 left promiscuous mode [ 861.999571] bridge0: port 1(bridge_slave_0) entered disabled state [ 864.251721] team0 (unregistering): Port device team_slave_1 removed [ 864.261731] team0 (unregistering): Port device team_slave_0 removed [ 864.272573] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 864.315966] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 864.371304] bond0 (unregistering): Released all slaves [ 864.789085] bridge0: port 1(bridge_slave_0) entered blocking state [ 864.813115] bridge0: port 1(bridge_slave_0) entered disabled state [ 864.825472] device bridge_slave_0 entered promiscuous mode [ 864.852990] bridge0: port 1(bridge_slave_0) entered blocking state [ 864.872095] bridge0: port 1(bridge_slave_0) entered disabled state [ 864.879579] device bridge_slave_0 entered promiscuous mode [ 864.891174] bridge0: port 2(bridge_slave_1) entered blocking state [ 864.901944] bridge0: port 2(bridge_slave_1) entered disabled state [ 864.909828] device bridge_slave_1 entered promiscuous mode [ 864.983064] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 864.993062] bridge0: port 2(bridge_slave_1) entered blocking state [ 864.999504] bridge0: port 2(bridge_slave_1) entered disabled state [ 865.017591] device bridge_slave_1 entered promiscuous mode [ 865.082154] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 865.101765] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 865.164797] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 865.335230] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 865.431474] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 865.453139] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 865.529606] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 865.536637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 865.566606] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 865.620012] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 865.627434] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 865.644944] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 865.652547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 865.741327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 865.751012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 865.863447] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 865.870889] team0: Port device team_slave_0 added [ 865.911846] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 865.919650] team0: Port device team_slave_1 added [ 865.962341] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 865.969866] team0: Port device team_slave_0 added [ 865.995215] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 866.044426] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 866.051946] team0: Port device team_slave_1 added [ 866.080367] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 866.142296] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 866.160035] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 866.167280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 866.184735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 866.212484] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 866.237984] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 866.251748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 866.268270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 866.279659] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 866.286901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 866.304503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 866.346795] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 866.354533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 866.366174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 866.759257] bridge0: port 2(bridge_slave_1) entered blocking state [ 866.765707] bridge0: port 2(bridge_slave_1) entered forwarding state [ 866.772440] bridge0: port 1(bridge_slave_0) entered blocking state [ 866.778821] bridge0: port 1(bridge_slave_0) entered forwarding state [ 866.787013] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 866.843251] bridge0: port 2(bridge_slave_1) entered blocking state [ 866.849641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 866.856370] bridge0: port 1(bridge_slave_0) entered blocking state [ 866.862792] bridge0: port 1(bridge_slave_0) entered forwarding state [ 866.870395] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 867.583173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 867.590451] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 868.499926] 8021q: adding VLAN 0 to HW filter on device bond0 [ 868.639937] 8021q: adding VLAN 0 to HW filter on device bond0 [ 868.660095] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 868.806426] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 868.820036] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 868.827094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 868.843076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 868.980519] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 868.987136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 868.995572] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 869.006907] 8021q: adding VLAN 0 to HW filter on device team0 [ 869.148149] 8021q: adding VLAN 0 to HW filter on device team0 03:36:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000003", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000074000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000010200000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000006000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) 03:36:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) [ 870.223542] print_req_error: I/O error, dev loop1, sector 128 03:36:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363afffffff4000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 870.312448] EXT4-fs (sda1): re-mounted. Opts: 03:36:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000c0ed000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000050000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00S', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) 03:36:37 executing program 1 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$vsock_stream(0x28, 0x1, 0x0) close(r0) 03:36:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000007000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 870.624522] print_req_error: I/O error, dev loop4, sector 128 03:36:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fffffdfd00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 870.686681] EXT4-fs (sda1): re-mounted. Opts: 03:36:37 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$vsock_stream(0x28, 0x1, 0x0) close(r0) [ 870.738459] FAULT_INJECTION: forcing a failure. [ 870.738459] name failslab, interval 1, probability 0, space 0, times 0 [ 870.754346] EXT4-fs (sda1): re-mounted. Opts: [ 870.794785] CPU: 0 PID: 19406 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 870.803316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 870.812683] Call Trace: [ 870.815300] dump_stack+0x244/0x39d [ 870.818956] ? dump_stack_print_info.cold.1+0x20/0x20 [ 870.824175] ? lock_downgrade+0x900/0x900 [ 870.828359] should_fail.cold.4+0xa/0x17 [ 870.832438] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 870.837562] ? lock_downgrade+0x900/0x900 03:36:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$vsock_stream(0x28, 0x1, 0x0) close(r0) [ 870.841740] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 870.847290] ? proc_fail_nth_write+0x9e/0x210 [ 870.851798] ? proc_cwd_link+0x1d0/0x1d0 [ 870.855884] ? find_held_lock+0x36/0x1c0 [ 870.859980] ? perf_trace_sched_process_exec+0x860/0x860 [ 870.865445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 870.871009] __should_failslab+0x124/0x180 [ 870.875307] should_failslab+0x9/0x14 [ 870.879143] __kmalloc+0x2e0/0x760 [ 870.882731] ? strncpy_from_user+0x5a0/0x5a0 [ 870.887159] ? fput+0x130/0x1a0 [ 870.890457] ? do_syscall_64+0x9a/0x820 03:36:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) [ 870.894453] ? __x64_sys_memfd_create+0x142/0x4f0 [ 870.899310] ? do_syscall_64+0x9a/0x820 [ 870.903328] __x64_sys_memfd_create+0x142/0x4f0 [ 870.908015] ? memfd_fcntl+0x1910/0x1910 [ 870.912156] do_syscall_64+0x1b9/0x820 [ 870.916056] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 870.921431] ? syscall_return_slowpath+0x5e0/0x5e0 [ 870.926374] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 870.931233] ? trace_hardirqs_on_caller+0x310/0x310 [ 870.936264] ? prepare_exit_to_usermode+0x3b0/0x3b0 03:36:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) [ 870.941287] ? prepare_exit_to_usermode+0x291/0x3b0 [ 870.946316] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 870.951182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.956383] RIP: 0033:0x457569 [ 870.959591] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 870.978507] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 870.986228] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 03:36:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00l', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) 03:36:38 executing program 1 (fault-call:2 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 870.993510] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 871.000791] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 871.008071] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f57c1b1f6d4 [ 871.015349] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 03:36:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$vsock_stream(0x28, 0x1, 0x0) close(0xffffffffffffffff) 03:36:38 executing program 5: socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 871.188252] FAULT_INJECTION: forcing a failure. [ 871.188252] name failslab, interval 1, probability 0, space 0, times 0 [ 871.237596] CPU: 1 PID: 19442 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 871.246177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.255537] Call Trace: [ 871.258164] dump_stack+0x244/0x39d [ 871.261821] ? dump_stack_print_info.cold.1+0x20/0x20 [ 871.267069] should_fail.cold.4+0xa/0x17 [ 871.271170] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 871.276303] ? zap_class+0x640/0x640 [ 871.280029] ? __lock_acquire+0x62f/0x4c20 [ 871.284287] ? lock_downgrade+0x900/0x900 [ 871.288449] ? check_preemption_disabled+0x48/0x280 [ 871.293492] ? find_held_lock+0x36/0x1c0 [ 871.297599] ? expand_files.part.8+0x571/0x9a0 [ 871.302209] ? perf_trace_sched_process_exec+0x860/0x860 [ 871.307674] ? find_held_lock+0x36/0x1c0 [ 871.311752] __should_failslab+0x124/0x180 [ 871.316002] should_failslab+0x9/0x14 [ 871.319823] kmem_cache_alloc+0x2be/0x730 [ 871.323995] ? shmem_destroy_callback+0xc0/0xc0 [ 871.328675] shmem_alloc_inode+0x1b/0x40 [ 871.332754] alloc_inode+0x63/0x190 [ 871.336746] new_inode_pseudo+0x71/0x1a0 [ 871.340829] ? prune_icache_sb+0x1c0/0x1c0 [ 871.345083] ? _raw_spin_unlock+0x2c/0x50 [ 871.349260] new_inode+0x1c/0x40 [ 871.352652] shmem_get_inode+0xf1/0x920 [ 871.356649] ? shmem_encode_fh+0x340/0x340 [ 871.356668] ? lock_downgrade+0x900/0x900 [ 871.356689] ? lock_release+0xa10/0xa10 [ 871.356703] ? perf_trace_sched_process_exec+0x860/0x860 [ 871.356722] ? usercopy_warn+0x110/0x110 [ 871.365115] __shmem_file_setup.part.50+0x83/0x2a0 [ 871.365150] shmem_file_setup+0x65/0x90 [ 871.365170] __x64_sys_memfd_create+0x2af/0x4f0 [ 871.365187] ? memfd_fcntl+0x1910/0x1910 [ 871.365217] do_syscall_64+0x1b9/0x820 [ 871.365232] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 871.365251] ? syscall_return_slowpath+0x5e0/0x5e0 [ 871.365266] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 871.365286] ? trace_hardirqs_on_caller+0x310/0x310 [ 871.365304] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 871.365323] ? prepare_exit_to_usermode+0x291/0x3b0 [ 871.365347] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 871.365371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.365383] RIP: 0033:0x457569 [ 871.365403] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 871.462359] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 871.470051] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 871.477308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a 03:36:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000010004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 871.484570] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 871.491828] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f57c1b1f6d4 [ 871.499092] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 871.510230] EXT4-fs (sda1): re-mounted. Opts: 03:36:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000048000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:38 executing program 5: socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:38 executing program 0 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) 03:36:38 executing program 1 (fault-call:2 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 871.624080] EXT4-fs (sda1): re-mounted. Opts: 03:36:38 executing program 5: socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:38 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) 03:36:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00z', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 871.731102] FAULT_INJECTION: forcing a failure. [ 871.731102] name failslab, interval 1, probability 0, space 0, times 0 [ 871.799543] CPU: 1 PID: 19473 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 871.808078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.817441] Call Trace: [ 871.820048] dump_stack+0x244/0x39d [ 871.823706] ? dump_stack_print_info.cold.1+0x20/0x20 [ 871.828925] should_fail.cold.4+0xa/0x17 [ 871.833010] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 871.838155] ? __kernel_text_address+0xd/0x40 [ 871.842682] ? unwind_get_return_address+0x61/0xa0 [ 871.847648] ? find_held_lock+0x36/0x1c0 [ 871.851824] ? __hci_req_update_eir+0x1d8/0x12c0 [ 871.856617] ? perf_trace_sched_process_exec+0x860/0x860 [ 871.862096] __should_failslab+0x124/0x180 [ 871.866358] should_failslab+0x9/0x14 [ 871.870177] kmem_cache_alloc+0x2be/0x730 [ 871.874343] ? mpol_shared_policy_init+0x235/0x650 [ 871.879284] ? current_time+0x72/0x1b0 [ 871.883187] __d_alloc+0xc8/0xb90 [ 871.886661] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 871.891701] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 871.896738] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 871.901948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 871.907500] ? timespec64_trunc+0xea/0x180 [ 871.911745] ? inode_init_owner+0x340/0x340 [ 871.916091] ? _raw_spin_unlock+0x2c/0x50 [ 871.920271] ? current_time+0x10b/0x1b0 [ 871.924259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 871.929815] ? __lockdep_init_map+0x105/0x590 [ 871.934352] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 871.939909] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 871.945485] d_alloc_pseudo+0x1d/0x30 [ 871.949307] alloc_file_pseudo+0x158/0x3f0 [ 871.953698] ? alloc_file+0x4d0/0x4d0 [ 871.957516] ? usercopy_warn+0x110/0x110 [ 871.961610] __shmem_file_setup.part.50+0x110/0x2a0 [ 871.966650] shmem_file_setup+0x65/0x90 [ 871.967873] FAULT_INJECTION: forcing a failure. [ 871.967873] name failslab, interval 1, probability 0, space 0, times 0 [ 871.970645] __x64_sys_memfd_create+0x2af/0x4f0 [ 871.970664] ? memfd_fcntl+0x1910/0x1910 [ 871.970696] do_syscall_64+0x1b9/0x820 [ 871.970713] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 871.970743] ? syscall_return_slowpath+0x5e0/0x5e0 [ 872.004800] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 872.009657] ? trace_hardirqs_on_caller+0x310/0x310 [ 872.014697] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 872.019731] ? prepare_exit_to_usermode+0x291/0x3b0 [ 872.024774] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 872.029632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.034835] RIP: 0033:0x457569 [ 872.038121] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 872.057034] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 872.065274] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 872.072652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 872.079930] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 872.087203] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f57c1b1f6d4 03:36:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$vsock_stream(0x28, 0x1, 0x0) close(r0) 03:36:39 executing program 5 (fault-call:2 fault-nth:0): r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000040)={'gretap0\x00', @dev={[], 0x12}}) [ 872.094482] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 872.101785] CPU: 0 PID: 19490 Comm: syz-executor5 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 872.110289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.119652] Call Trace: [ 872.122257] dump_stack+0x244/0x39d [ 872.125905] ? dump_stack_print_info.cold.1+0x20/0x20 [ 872.131103] ? zap_class+0x640/0x640 [ 872.134857] ? zap_class+0x640/0x640 [ 872.138590] should_fail.cold.4+0xa/0x17 [ 872.142669] ? check_preemption_disabled+0x48/0x280 03:36:39 executing program 1 (fault-call:2 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 872.142693] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 872.142723] ? zap_class+0x640/0x640 [ 872.152832] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 872.152923] ? mr_mfc_find_parent+0x668/0xbc0 [ 872.152946] ? find_held_lock+0x36/0x1c0 [ 872.170733] ? __lock_is_held+0xb5/0x140 [ 872.174828] ? perf_trace_sched_process_exec+0x860/0x860 [ 872.180340] ? ip6mr_mfc_add+0x3d5/0x1e00 [ 872.184515] ? lock_downgrade+0x900/0x900 [ 872.188679] ? check_preemption_disabled+0x48/0x280 [ 872.193725] __should_failslab+0x124/0x180 [ 872.197982] should_failslab+0x9/0x14 [ 872.201803] kmem_cache_alloc+0x2be/0x730 [ 872.205983] ip6mr_mfc_add+0x519/0x1e00 [ 872.209996] ? __rhashtable_insert_fast.constprop.47+0x1790/0x1790 [ 872.216352] ? lock_unpin_lock+0x4a0/0x4a0 [ 872.220608] ? zap_class+0x640/0x640 [ 872.224358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 872.229938] ? refcount_sub_and_test_checked+0x203/0x310 [ 872.235416] ? find_held_lock+0x36/0x1c0 [ 872.239506] ? __might_fault+0x12b/0x1e0 [ 872.243597] ? zap_class+0x640/0x640 [ 872.247384] ? lock_release+0xa10/0xa10 [ 872.251383] ? perf_trace_sched_process_exec+0x860/0x860 [ 872.256856] ? apparmor_cred_transfer+0x590/0x590 [ 872.261714] ? mark_held_locks+0x130/0x130 [ 872.265964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 872.271539] ip6_mroute_setsockopt+0x6f0/0x1d50 [ 872.276212] ? ip6_mroute_setsockopt+0x6f0/0x1d50 [ 872.281046] ? ip6mr_sk_done+0x540/0x540 [ 872.285186] ? print_usage_bug+0xc0/0xc0 [ 872.289238] ? zap_class+0x640/0x640 [ 872.292949] ? print_usage_bug+0xc0/0xc0 [ 872.297020] ? __lock_acquire+0x62f/0x4c20 [ 872.301248] ? find_held_lock+0x36/0x1c0 [ 872.305305] ? __might_fault+0x12b/0x1e0 [ 872.309354] ? lock_downgrade+0x900/0x900 [ 872.313523] do_ipv6_setsockopt.isra.9+0x3fb/0x4700 [ 872.318531] ? ipv6_update_options+0x3b0/0x3b0 [ 872.323126] ? find_held_lock+0x36/0x1c0 [ 872.327197] ? find_held_lock+0x36/0x1c0 [ 872.331264] ? __fget+0x4aa/0x740 [ 872.334705] ? lock_downgrade+0x900/0x900 [ 872.338850] ? check_preemption_disabled+0x48/0x280 [ 872.343873] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 872.348792] ? kasan_check_read+0x11/0x20 [ 872.352932] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 872.358201] ? rcu_softirq_qs+0x20/0x20 [ 872.362173] ? __fget+0x4d1/0x740 [ 872.365618] ? ksys_dup3+0x680/0x680 [ 872.369345] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 872.374872] ? perf_trace_sched_process_exec+0x860/0x860 [ 872.380308] ? proc_cwd_link+0x1d0/0x1d0 [ 872.384363] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 872.389897] ? aa_label_sk_perm+0x91/0x100 [ 872.394121] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 872.399090] ? aa_sk_perm+0x22b/0x8e0 [ 872.402885] ? fget_raw+0x20/0x20 [ 872.406327] ? aa_af_perm+0x5a0/0x5a0 [ 872.410122] ipv6_setsockopt+0xbd/0x170 [ 872.414099] ? ipv6_setsockopt+0xbd/0x170 [ 872.418238] rawv6_setsockopt+0x59/0x140 [ 872.422289] sock_common_setsockopt+0x9a/0xe0 [ 872.426778] __sys_setsockopt+0x1ba/0x3c0 [ 872.430915] ? kernel_accept+0x310/0x310 [ 872.434967] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 872.439541] ? trace_hardirqs_on+0xbd/0x310 [ 872.443861] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.449229] ? trace_hardirqs_off_caller+0x300/0x300 [ 872.454327] __x64_sys_setsockopt+0xbe/0x150 [ 872.458731] do_syscall_64+0x1b9/0x820 [ 872.462616] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 872.467989] ? syscall_return_slowpath+0x5e0/0x5e0 [ 872.472920] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 872.477769] ? trace_hardirqs_on_caller+0x310/0x310 [ 872.482786] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 872.487806] ? prepare_exit_to_usermode+0x291/0x3b0 [ 872.492812] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 872.497669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.502861] RIP: 0033:0x457569 [ 872.506058] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 872.524942] RSP: 002b:00007f6790be4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 872.532640] RAX: ffffffffffffffda RBX: 00007f6790be4c90 RCX: 0000000000457569 [ 872.539902] RDX: 00000000000000d2 RSI: 0000000000000029 RDI: 0000000000000003 [ 872.547159] RBP: 000000000072bf00 R08: 000000000000005c R09: 0000000000000000 [ 872.554412] R10: 0000000020000080 R11: 0000000000000246 R12: 00007f6790be56d4 [ 872.561663] R13: 00000000004c9e50 R14: 00000000004d6048 R15: 0000000000000004 03:36:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000000039e55e1c4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00007400000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$vsock_stream(0x28, 0x1, 0x0) close(r0) 03:36:39 executing program 5 (fault-call:2 fault-nth:1): r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 872.745405] FAULT_INJECTION: forcing a failure. [ 872.745405] name failslab, interval 1, probability 0, space 0, times 0 [ 872.762147] EXT4-fs (sda1): re-mounted. Opts: [ 872.811693] FAULT_INJECTION: forcing a failure. [ 872.811693] name failslab, interval 1, probability 0, space 0, times 0 [ 872.812855] CPU: 1 PID: 19512 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 872.831409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.831416] Call Trace: [ 872.831441] dump_stack+0x244/0x39d [ 872.831464] ? dump_stack_print_info.cold.1+0x20/0x20 [ 872.831486] ? __save_stack_trace+0x8d/0xf0 [ 872.852230] should_fail.cold.4+0xa/0x17 [ 872.852257] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 872.852276] ? save_stack+0x43/0xd0 [ 872.852289] ? kasan_kmalloc+0xc7/0xe0 [ 872.852319] ? percpu_ref_put_many+0x11c/0x260 [ 872.878149] ? zap_class+0x640/0x640 [ 872.881883] ? find_held_lock+0x36/0x1c0 [ 872.885984] ? perf_trace_sched_process_exec+0x860/0x860 [ 872.891446] ? lock_downgrade+0x900/0x900 [ 872.895623] __should_failslab+0x124/0x180 [ 872.899874] should_failslab+0x9/0x14 [ 872.903687] kmem_cache_alloc+0x2be/0x730 [ 872.907858] ? d_set_d_op+0x31d/0x410 [ 872.911693] __alloc_file+0xa8/0x470 [ 872.915420] ? file_free_rcu+0xd0/0xd0 [ 872.919321] ? d_instantiate+0x79/0xa0 [ 872.923218] ? lock_downgrade+0x900/0x900 [ 872.927389] ? kasan_check_read+0x11/0x20 [ 872.931544] ? do_raw_spin_unlock+0xa7/0x330 [ 872.935975] ? do_raw_spin_trylock+0x270/0x270 [ 872.940601] alloc_empty_file+0x72/0x170 [ 872.944681] alloc_file+0x5e/0x4d0 [ 872.948229] ? _raw_spin_unlock+0x2c/0x50 [ 872.952405] alloc_file_pseudo+0x261/0x3f0 [ 872.956658] ? alloc_file+0x4d0/0x4d0 [ 872.960491] ? usercopy_warn+0x110/0x110 [ 872.964586] __shmem_file_setup.part.50+0x110/0x2a0 [ 872.969617] shmem_file_setup+0x65/0x90 [ 872.973608] __x64_sys_memfd_create+0x2af/0x4f0 [ 872.978297] ? memfd_fcntl+0x1910/0x1910 [ 872.982382] do_syscall_64+0x1b9/0x820 [ 872.986284] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 872.991660] ? syscall_return_slowpath+0x5e0/0x5e0 [ 872.996596] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 873.001467] ? trace_hardirqs_on_caller+0x310/0x310 [ 873.006495] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 873.011525] ? prepare_exit_to_usermode+0x291/0x3b0 [ 873.016556] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 873.021427] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 873.026642] RIP: 0033:0x457569 [ 873.029845] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 873.048756] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 03:36:40 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$vsock_stream(0x28, 0x1, 0x0) close(r0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x2, 0x7fffffff, 0x0, 0x76, 0xda, 0x4}) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0xa31f, 0x84200) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000100)={0x6000000000000000, 0x1000, 0x9, 0x0, 0xf}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x800, 0x0) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000080)={0x101, 0x4, 0x1}) [ 873.056468] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 [ 873.063747] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 873.071017] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 873.078294] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f57c1b1f6d4 [ 873.085567] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 873.092883] CPU: 0 PID: 19522 Comm: syz-executor5 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 873.101398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:36:40 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x8) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r0, 0x0, 0x5, &(0x7f0000000040)='{]lo\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000001c0)={r0, 0x50, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r2, r1, 0x0, 0x1, &(0x7f0000000100)='\x00', r3}, 0x30) close(r1) [ 873.110762] Call Trace: [ 873.113364] dump_stack+0x244/0x39d [ 873.117015] ? dump_stack_print_info.cold.1+0x20/0x20 [ 873.122225] ? mark_held_locks+0x130/0x130 [ 873.126482] should_fail.cold.4+0xa/0x17 [ 873.130571] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 873.135691] ? __lock_acquire+0x62f/0x4c20 [ 873.139944] ? __rhashtable_insert_fast.constprop.47+0x8b1/0x1790 [ 873.146187] ? __rhashtable_insert_fast.constprop.47+0x8b1/0x1790 [ 873.152439] ? mark_held_locks+0x130/0x130 [ 873.156699] ? zap_class+0x640/0x640 03:36:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x6, 0x2000) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x63d2aecf, 0x2, 0x7, 0x5, 0x0, 0xea, 0x8008, 0x0, 0x4, 0xffff, 0x7, 0xfffffffffffffff9, 0x4, 0x1, 0x9, 0xfffffffffffffe01, 0x8, 0x3, 0x4, 0x9, 0x2, 0x5, 0xffff, 0x82e6, 0x3, 0x9, 0x1ff, 0x3, 0x8, 0x6, 0x1000, 0x10001, 0x4, 0x9, 0x39a, 0x8, 0x0, 0x8, 0x2, @perf_config_ext={0x7, 0x4}, 0x8000, 0xffff, 0x6, 0x7, 0x80, 0x7, 0xffffffff}, r2, 0x3, r3, 0xa) close(r1) [ 873.160422] ? ip6_mr_forward+0x1450/0x1450 [ 873.164764] ? print_usage_bug+0xc0/0xc0 [ 873.168842] ? __save_stack_trace+0x8d/0xf0 [ 873.173199] ? ip6mr_rule_fill+0xb0/0xb0 [ 873.177297] ? find_held_lock+0x36/0x1c0 [ 873.181386] __should_failslab+0x124/0x180 [ 873.185658] should_failslab+0x9/0x14 [ 873.189499] kmem_cache_alloc_node+0x56/0x730 [ 873.194012] ? trace_hardirqs_on+0xbd/0x310 [ 873.198375] ? kasan_check_read+0x11/0x20 [ 873.202538] ? debug_object_assert_init+0x368/0x4b0 [ 873.207574] __alloc_skb+0x114/0x770 [ 873.211299] ? netdev_alloc_frag+0x1f0/0x1f0 [ 873.215714] ? atomic_notifier_call_chain+0xc6/0x190 [ 873.220842] ? lock_downgrade+0x900/0x900 [ 873.224999] ? check_preemption_disabled+0x48/0x280 [ 873.230035] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 873.234980] ? kasan_check_read+0x11/0x20 [ 873.239145] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 873.244444] ? rcu_softirq_qs+0x20/0x20 [ 873.248433] ? _raw_spin_unlock_bh+0x30/0x40 [ 873.252947] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 873.258498] mr6_netlink_event+0xdf/0x1a0 [ 873.262660] ip6mr_mfc_add+0xe46/0x1e00 [ 873.266639] ? __rhashtable_insert_fast.constprop.47+0x1790/0x1790 [ 873.272955] ? ip6mr_rule_fill+0xb0/0xb0 [ 873.277022] ? lock_unpin_lock+0x4a0/0x4a0 [ 873.281259] ? zap_class+0x640/0x640 [ 873.284984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 873.290513] ? refcount_sub_and_test_checked+0x203/0x310 [ 873.295965] ? find_held_lock+0x36/0x1c0 [ 873.300049] ? __might_fault+0x12b/0x1e0 [ 873.304121] ? zap_class+0x640/0x640 [ 873.307830] ? lock_release+0xa10/0xa10 [ 873.311789] ? perf_trace_sched_process_exec+0x860/0x860 [ 873.317246] ? apparmor_cred_transfer+0x590/0x590 [ 873.322101] ? mark_held_locks+0x130/0x130 [ 873.326350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 873.331907] ip6_mroute_setsockopt+0x6f0/0x1d50 [ 873.336579] ? ip6_mroute_setsockopt+0x6f0/0x1d50 [ 873.341463] ? ip6mr_sk_done+0x540/0x540 [ 873.345545] ? print_usage_bug+0xc0/0xc0 [ 873.349620] ? zap_class+0x640/0x640 [ 873.353382] ? print_usage_bug+0xc0/0xc0 [ 873.357437] ? __lock_acquire+0x62f/0x4c20 [ 873.361664] ? find_held_lock+0x36/0x1c0 [ 873.365734] ? __might_fault+0x12b/0x1e0 [ 873.369817] ? lock_downgrade+0x900/0x900 [ 873.373976] do_ipv6_setsockopt.isra.9+0x3fb/0x4700 [ 873.378989] ? ipv6_update_options+0x3b0/0x3b0 [ 873.383566] ? find_held_lock+0x36/0x1c0 [ 873.387618] ? find_held_lock+0x36/0x1c0 [ 873.391695] ? __fget+0x4aa/0x740 [ 873.395171] ? lock_downgrade+0x900/0x900 [ 873.399320] ? check_preemption_disabled+0x48/0x280 [ 873.404340] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 873.409274] ? kasan_check_read+0x11/0x20 [ 873.413461] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 873.418731] ? rcu_softirq_qs+0x20/0x20 [ 873.422708] ? __fget+0x4d1/0x740 [ 873.426207] ? ksys_dup3+0x680/0x680 [ 873.429925] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 873.435462] ? perf_trace_sched_process_exec+0x860/0x860 [ 873.440915] ? proc_cwd_link+0x1d0/0x1d0 [ 873.444974] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 873.450510] ? aa_label_sk_perm+0x91/0x100 [ 873.454757] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 873.459697] ? aa_sk_perm+0x22b/0x8e0 [ 873.463488] ? fget_raw+0x20/0x20 [ 873.466931] ? aa_af_perm+0x5a0/0x5a0 [ 873.470743] ipv6_setsockopt+0xbd/0x170 [ 873.474735] ? ipv6_setsockopt+0xbd/0x170 [ 873.478907] rawv6_setsockopt+0x59/0x140 [ 873.482976] sock_common_setsockopt+0x9a/0xe0 [ 873.487478] __sys_setsockopt+0x1ba/0x3c0 [ 873.491634] ? kernel_accept+0x310/0x310 [ 873.495701] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 873.500302] ? trace_hardirqs_on+0xbd/0x310 [ 873.504637] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 873.510009] ? trace_hardirqs_off_caller+0x300/0x300 [ 873.515138] __x64_sys_setsockopt+0xbe/0x150 [ 873.519556] do_syscall_64+0x1b9/0x820 [ 873.523449] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 873.528828] ? syscall_return_slowpath+0x5e0/0x5e0 [ 873.533761] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 873.538604] ? trace_hardirqs_on_caller+0x310/0x310 [ 873.543644] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 873.548658] ? prepare_exit_to_usermode+0x291/0x3b0 [ 873.553678] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 873.558532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 873.563736] RIP: 0033:0x457569 [ 873.566934] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 873.585841] RSP: 002b:00007f6790be4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 873.593554] RAX: ffffffffffffffda RBX: 00007f6790be4c90 RCX: 0000000000457569 [ 873.600824] RDX: 00000000000000d2 RSI: 0000000000000029 RDI: 0000000000000003 [ 873.608099] RBP: 000000000072bf00 R08: 000000000000005c R09: 0000000000000000 [ 873.615372] R10: 0000000020000080 R11: 0000000000000246 R12: 00007f6790be56d4 [ 873.622654] R13: 00000000004c9e50 R14: 00000000004d6048 R15: 0000000000000004 [ 873.675395] EXT4-fs (sda1): re-mounted. Opts: 03:36:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0060000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000fffffff6000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:40 executing program 1 (fault-call:2 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:40 executing program 5 (fault-call:2 fault-nth:2): r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) socket$unix(0x1, 0x5, 0x0) 03:36:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000a7e254f5773f8d2004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) r0 = shmget(0x0, 0x2000, 0x78000800, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xf800000000000000, 0x600040) accept$nfc_llcp(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x60) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xd) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x1, &(0x7f0000000000)) mount(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfs4\x00', 0xa3020, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000100)=""/50, &(0x7f0000000140)=0x32) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e20, 0x7, @mcast2, 0x44e}}, 0x3, 0x494}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e20, 0x23, @remote, 0xfffffffffffffff7}}}, &(0x7f0000000380)=0x84) r3 = socket$vsock_stream(0x28, 0x1, 0x0) close(r3) [ 873.877988] FAULT_INJECTION: forcing a failure. [ 873.877988] name failslab, interval 1, probability 0, space 0, times 0 03:36:41 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 873.959836] CPU: 0 PID: 19554 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 873.968372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 873.977734] Call Trace: [ 873.980346] dump_stack+0x244/0x39d [ 873.984007] ? dump_stack_print_info.cold.1+0x20/0x20 [ 873.989240] ? lock_downgrade+0x900/0x900 [ 873.993405] ? check_preemption_disabled+0x48/0x280 [ 873.998440] should_fail.cold.4+0xa/0x17 [ 873.998459] ? rcu_softirq_qs+0x20/0x20 [ 873.998488] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 874.011647] ? is_bpf_text_address+0xd3/0x170 [ 874.011674] ? kernel_text_address+0x79/0xf0 [ 874.020563] ? __kernel_text_address+0xd/0x40 [ 874.021036] EXT4-fs (sda1): re-mounted. Opts: [ 874.025058] ? unwind_get_return_address+0x61/0xa0 [ 874.025078] ? __save_stack_trace+0x8d/0xf0 [ 874.025101] ? find_held_lock+0x36/0x1c0 [ 874.025141] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 874.025157] ? perf_trace_sched_process_exec+0x860/0x860 [ 874.025194] __should_failslab+0x124/0x180 03:36:41 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x3a, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 874.058619] should_failslab+0x9/0x14 [ 874.062654] kmem_cache_alloc_trace+0x2d7/0x750 [ 874.067350] ? __might_sleep+0x95/0x190 [ 874.071343] apparmor_file_alloc_security+0x17b/0xac0 [ 874.076544] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 874.082100] ? apparmor_path_rename+0xcd0/0xcd0 [ 874.086801] ? rcu_read_lock_sched_held+0x14f/0x180 [ 874.091843] ? kmem_cache_alloc+0x33a/0x730 [ 874.096180] ? d_set_d_op+0x31d/0x410 [ 874.100004] security_file_alloc+0x4c/0xa0 [ 874.104254] __alloc_file+0x12a/0x470 03:36:41 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 874.108078] ? file_free_rcu+0xd0/0xd0 [ 874.111989] ? d_instantiate+0x79/0xa0 [ 874.115901] ? lock_downgrade+0x900/0x900 [ 874.120079] ? kasan_check_read+0x11/0x20 [ 874.124236] ? do_raw_spin_unlock+0xa7/0x330 [ 874.128660] ? do_raw_spin_trylock+0x270/0x270 [ 874.133327] alloc_empty_file+0x72/0x170 [ 874.137402] alloc_file+0x5e/0x4d0 [ 874.140954] ? _raw_spin_unlock+0x2c/0x50 [ 874.145128] alloc_file_pseudo+0x261/0x3f0 [ 874.149394] ? alloc_file+0x4d0/0x4d0 [ 874.153212] ? usercopy_warn+0x110/0x110 [ 874.157309] __shmem_file_setup.part.50+0x110/0x2a0 [ 874.162348] shmem_file_setup+0x65/0x90 [ 874.166345] __x64_sys_memfd_create+0x2af/0x4f0 [ 874.171035] ? memfd_fcntl+0x1910/0x1910 [ 874.175129] do_syscall_64+0x1b9/0x820 [ 874.179028] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 874.184402] ? syscall_return_slowpath+0x5e0/0x5e0 [ 874.189337] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 874.189358] ? trace_hardirqs_on_caller+0x310/0x310 [ 874.199211] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 874.204252] ? prepare_exit_to_usermode+0x291/0x3b0 03:36:41 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xcf, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 874.209294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 874.214161] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 874.219367] RIP: 0033:0x457569 [ 874.222573] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 874.241679] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 874.249402] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000457569 03:36:41 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd0, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 874.256680] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc78a [ 874.263957] RBP: 000000000072bf00 R08: 0000000000100020 R09: 00000000fbad8001 [ 874.271236] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f57c1b1f6d4 [ 874.278520] R13: 00000000004c4a1e R14: 00000000004d7d88 R15: 0000000000000003 [ 874.349815] EXT4-fs (sda1): re-mounted. Opts: 03:36:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000400000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) 03:36:41 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd1, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000fffffff5004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00`', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:41 executing program 1 (fault-call:2 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40100, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x0, @dev={[], 0x1f}, 'tunl0\x00'}}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) 03:36:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000010000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 874.581557] FAULT_INJECTION: forcing a failure. [ 874.581557] name failslab, interval 1, probability 0, space 0, times 0 [ 874.619830] CPU: 1 PID: 19610 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 03:36:41 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xca, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:41 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xe1, 0x840) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x4, @mcast2, 0x5}, @in6={0xa, 0x4e20, 0x1, @local, 0xc317}, @in={0x2, 0x4e23}, @in6={0xa, 0x4e20, 0x2, @local, 0x800}, @in={0x2, 0x4e23, @remote}], 0x74) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) mq_notify(r0, &(0x7f00000003c0)={0x0, 0x41, 0x0, @thr={&(0x7f0000000240)="85a80686efe8c3ce0230465572fae7706ba4ee66131f63e8672dee8eee557d02838374bc989772b4b554385616e6773eb0b39cf10d87c89ddfc54e74d02d70fe8fd98fe6cfd0e31dcbd1bfba571966da7c6a066bc307cb86baa26ba2c2caabfcd924e789c0dd4234fe109807acc02527421c80103b6259041b9007670526660015084313cc0226463c9e9ece8f1a", &(0x7f0000000300)="e3660a20e22424713819616c09e2f9e74e0e9e7628c6dabaa5160546f3d7c020f6365c2abafc3923bad07bb6fea401a69e3390a720e9c04729a8f23f232c3be7caf3071b1cb2b63e09de27cba0eff05335b6dc9c8f05b19f81cf8e675dc8b443888529600df1cf7d79bf7fdf612cb996b1530d8e04da0a666abcd0b2582a04c8f797e397ee0d23f0432490"}}) close(r2) getsockopt$inet_dccp_buf(r0, 0x21, 0x0, &(0x7f00000000c0)=""/225, &(0x7f0000000200)=0xe1) [ 874.628393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.637757] Call Trace: [ 874.640368] dump_stack+0x244/0x39d [ 874.644027] ? dump_stack_print_info.cold.1+0x20/0x20 [ 874.649257] ? find_held_lock+0x36/0x1c0 [ 874.653343] should_fail.cold.4+0xa/0x17 [ 874.657430] ? find_held_lock+0x36/0x1c0 [ 874.661533] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 874.666652] ? lock_downgrade+0x900/0x900 [ 874.670814] ? current_time+0x72/0x1b0 [ 874.674740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 874.680296] ? timespec64_trunc+0xea/0x180 [ 874.684534] ? inode_init_owner+0x340/0x340 [ 874.688864] ? find_held_lock+0x36/0x1c0 [ 874.693022] ? rpcrdma_wc_receive+0x1f8/0x8e0 [ 874.697557] ? perf_trace_sched_process_exec+0x860/0x860 [ 874.703015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 874.708546] __should_failslab+0x124/0x180 [ 874.712776] should_failslab+0x9/0x14 [ 874.716567] kmem_cache_alloc+0x2be/0x730 [ 874.720715] ? do_sys_ftruncate+0x428/0x550 [ 874.725046] ? lock_downgrade+0x900/0x900 [ 874.729191] getname_flags+0xd0/0x590 [ 874.732990] ? __lock_is_held+0xb5/0x140 [ 874.737055] getname+0x19/0x20 [ 874.740259] do_sys_open+0x383/0x700 [ 874.743961] ? filp_open+0x80/0x80 [ 874.747493] ? trace_hardirqs_off_caller+0x300/0x300 [ 874.752593] ? do_sys_ftruncate+0x449/0x550 [ 874.756927] __x64_sys_open+0x7e/0xc0 [ 874.760737] do_syscall_64+0x1b9/0x820 [ 874.764625] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 874.769997] ? syscall_return_slowpath+0x5e0/0x5e0 [ 874.774928] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:36:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2d0, 0x101000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) [ 874.779788] ? trace_hardirqs_on_caller+0x310/0x310 [ 874.784815] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 874.789850] ? prepare_exit_to_usermode+0x291/0x3b0 [ 874.794866] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 874.799719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 874.804922] RIP: 0033:0x4111a1 [ 874.808147] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 874.827081] RSP: 002b:00007f57c1b1ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 874.834827] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 874.842122] RDX: 00007f57c1b1eafa RSI: 0000000000000002 RDI: 00007f57c1b1eaf0 [ 874.849416] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 874.856703] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 874.863963] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 03:36:42 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000040)={0x2, 0x5, 0x80000001, {}, 0x7, 0x7ff}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) [ 874.910463] EXT4-fs (sda1): re-mounted. Opts: 03:36:42 executing program 1 (fault-call:2 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000080004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00006c0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000fdfdffff000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 875.109276] FAULT_INJECTION: forcing a failure. [ 875.109276] name failslab, interval 1, probability 0, space 0, times 0 [ 875.212198] CPU: 0 PID: 19643 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 875.220747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.230105] Call Trace: [ 875.232716] dump_stack+0x244/0x39d [ 875.236362] ? dump_stack_print_info.cold.1+0x20/0x20 [ 875.241560] ? print_usage_bug+0xc0/0xc0 [ 875.245650] should_fail.cold.4+0xa/0x17 [ 875.249715] ? find_held_lock+0x36/0x1c0 [ 875.253789] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 875.258904] ? lock_downgrade+0x900/0x900 [ 875.263057] ? check_preemption_disabled+0x48/0x280 [ 875.268086] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 875.273022] ? kasan_check_read+0x11/0x20 [ 875.277183] ? find_held_lock+0x36/0x1c0 [ 875.281273] ? perf_trace_sched_process_exec+0x860/0x860 [ 875.286739] __should_failslab+0x124/0x180 [ 875.290982] should_failslab+0x9/0x14 [ 875.294786] kmem_cache_alloc+0x2be/0x730 [ 875.298937] ? zap_class+0x640/0x640 [ 875.302663] ? print_usage_bug+0xc0/0xc0 [ 875.306725] ? mark_held_locks+0x130/0x130 [ 875.310973] __alloc_file+0xa8/0x470 [ 875.314697] ? file_free_rcu+0xd0/0xd0 [ 875.318603] ? find_held_lock+0x36/0x1c0 [ 875.322697] ? is_bpf_text_address+0xac/0x170 [ 875.327196] ? lock_downgrade+0x900/0x900 [ 875.331342] ? check_preemption_disabled+0x48/0x280 [ 875.336372] alloc_empty_file+0x72/0x170 [ 875.340438] path_openat+0x170/0x5150 [ 875.344256] ? rcu_softirq_qs+0x20/0x20 [ 875.348241] ? unwind_dump+0x190/0x190 [ 875.352142] ? zap_class+0x640/0x640 [ 875.355862] ? path_lookupat.isra.43+0xc00/0xc00 [ 875.360623] ? unwind_get_return_address+0x61/0xa0 [ 875.365565] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 875.370586] ? expand_files.part.8+0x571/0x9a0 [ 875.375192] ? find_held_lock+0x36/0x1c0 [ 875.379264] ? __alloc_fd+0x347/0x6e0 [ 875.383075] ? lock_downgrade+0x900/0x900 [ 875.387233] ? getname+0x19/0x20 [ 875.390608] ? kasan_check_read+0x11/0x20 [ 875.394778] ? do_raw_spin_unlock+0xa7/0x330 [ 875.399187] ? do_raw_spin_trylock+0x270/0x270 [ 875.403772] ? __lock_is_held+0xb5/0x140 [ 875.407838] ? __check_object_size+0xb1/0x782 [ 875.412373] ? _raw_spin_unlock+0x2c/0x50 [ 875.416526] ? __alloc_fd+0x347/0x6e0 [ 875.420343] do_filp_open+0x255/0x380 [ 875.424151] ? may_open_dev+0x100/0x100 [ 875.428144] ? get_unused_fd_flags+0x122/0x1a0 [ 875.432730] ? __alloc_fd+0x6e0/0x6e0 [ 875.436540] ? __lock_is_held+0xb5/0x140 [ 875.440618] do_sys_open+0x568/0x700 [ 875.444350] ? filp_open+0x80/0x80 [ 875.447899] ? trace_hardirqs_off_caller+0x300/0x300 [ 875.453003] ? do_sys_ftruncate+0x449/0x550 [ 875.457356] __x64_sys_open+0x7e/0xc0 [ 875.461167] do_syscall_64+0x1b9/0x820 [ 875.465059] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 875.470428] ? syscall_return_slowpath+0x5e0/0x5e0 [ 875.475360] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 875.480214] ? trace_hardirqs_on_caller+0x310/0x310 [ 875.485237] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 875.490259] ? prepare_exit_to_usermode+0x291/0x3b0 [ 875.495287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 875.500142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 875.505331] RIP: 0033:0x4111a1 [ 875.508528] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 875.527432] RSP: 002b:00007f57c1b1ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 875.535140] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 875.542413] RDX: 00007f57c1b1eafa RSI: 0000000000000002 RDI: 00007f57c1b1eaf0 [ 875.549683] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 03:36:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$vsock_stream(0x28, 0x1, 0x0) close(r0) 03:36:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 875.556952] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 875.564219] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 03:36:42 executing program 1 (fault-call:2 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00007fffffffffffffff004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 875.643900] EXT4-fs: 1 callbacks suppressed [ 875.643913] EXT4-fs (sda1): re-mounted. Opts: 03:36:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) sync() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) [ 875.752330] EXT4-fs (sda1): re-mounted. Opts: 03:36:42 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0x7, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00003f0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 875.857548] FAULT_INJECTION: forcing a failure. [ 875.857548] name failslab, interval 1, probability 0, space 0, times 0 [ 875.901152] CPU: 1 PID: 19686 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 875.909704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.919061] Call Trace: [ 875.921668] dump_stack+0x244/0x39d [ 875.925323] ? dump_stack_print_info.cold.1+0x20/0x20 [ 875.930522] ? lock_downgrade+0x900/0x900 [ 875.934675] ? check_preemption_disabled+0x48/0x280 [ 875.939703] should_fail.cold.4+0xa/0x17 [ 875.943769] ? rcu_softirq_qs+0x20/0x20 [ 875.947756] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 875.953005] ? is_bpf_text_address+0xd3/0x170 [ 875.957508] ? kernel_text_address+0x79/0xf0 [ 875.961923] ? __kernel_text_address+0xd/0x40 [ 875.966427] ? unwind_get_return_address+0x61/0xa0 [ 875.971365] ? __save_stack_trace+0x8d/0xf0 [ 875.975700] ? find_held_lock+0x36/0x1c0 [ 875.979775] ? __drm_legacy_mapbufs+0x678/0x9e0 [ 875.984464] ? do_syscall_64+0x1b9/0x820 [ 875.988529] ? perf_trace_sched_process_exec+0x860/0x860 [ 875.993995] __should_failslab+0x124/0x180 [ 875.998239] should_failslab+0x9/0x14 [ 876.002043] kmem_cache_alloc_trace+0x2d7/0x750 [ 876.006717] ? __might_sleep+0x95/0x190 [ 876.010705] apparmor_file_alloc_security+0x17b/0xac0 [ 876.015901] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 876.021445] ? apparmor_path_rename+0xcd0/0xcd0 [ 876.026137] ? rcu_read_lock_sched_held+0x14f/0x180 [ 876.031161] ? kmem_cache_alloc+0x33a/0x730 [ 876.035484] ? zap_class+0x640/0x640 [ 876.039207] security_file_alloc+0x4c/0xa0 [ 876.043453] __alloc_file+0x12a/0x470 [ 876.047258] ? file_free_rcu+0xd0/0xd0 [ 876.051155] ? find_held_lock+0x36/0x1c0 [ 876.055238] ? is_bpf_text_address+0xac/0x170 [ 876.060200] ? lock_downgrade+0x900/0x900 [ 876.064361] ? check_preemption_disabled+0x48/0x280 [ 876.069397] alloc_empty_file+0x72/0x170 [ 876.073469] path_openat+0x170/0x5150 [ 876.077280] ? rcu_softirq_qs+0x20/0x20 [ 876.081260] ? unwind_dump+0x190/0x190 [ 876.085171] ? zap_class+0x640/0x640 [ 876.088911] ? path_lookupat.isra.43+0xc00/0xc00 [ 876.093670] ? unwind_get_return_address+0x61/0xa0 [ 876.098607] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 876.103647] ? expand_files.part.8+0x571/0x9a0 [ 876.108247] ? find_held_lock+0x36/0x1c0 [ 876.112323] ? __alloc_fd+0x347/0x6e0 [ 876.116139] ? lock_downgrade+0x900/0x900 [ 876.120291] ? getname+0x19/0x20 [ 876.123677] ? kasan_check_read+0x11/0x20 [ 876.127829] ? do_raw_spin_unlock+0xa7/0x330 [ 876.132245] ? do_raw_spin_trylock+0x270/0x270 [ 876.136834] ? __lock_is_held+0xb5/0x140 [ 876.140901] ? __check_object_size+0xb1/0x782 [ 876.145422] ? _raw_spin_unlock+0x2c/0x50 [ 876.149591] ? __alloc_fd+0x347/0x6e0 [ 876.153428] do_filp_open+0x255/0x380 [ 876.157243] ? may_open_dev+0x100/0x100 [ 876.161247] ? get_unused_fd_flags+0x122/0x1a0 [ 876.165841] ? __alloc_fd+0x6e0/0x6e0 [ 876.169651] ? __lock_is_held+0xb5/0x140 [ 876.173734] do_sys_open+0x568/0x700 [ 876.177459] ? filp_open+0x80/0x80 [ 876.181010] ? trace_hardirqs_off_caller+0x300/0x300 [ 876.186119] ? do_sys_ftruncate+0x449/0x550 [ 876.190458] __x64_sys_open+0x7e/0xc0 [ 876.194270] do_syscall_64+0x1b9/0x820 [ 876.198165] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 876.203545] ? syscall_return_slowpath+0x5e0/0x5e0 [ 876.208484] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 876.213337] ? trace_hardirqs_on_caller+0x310/0x310 [ 876.218380] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 876.223406] ? prepare_exit_to_usermode+0x291/0x3b0 [ 876.228436] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 876.233295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.238493] RIP: 0033:0x4111a1 [ 876.241691] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 876.260690] RSP: 002b:00007f57c1b1ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 876.268402] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 [ 876.275678] RDX: 00007f57c1b1eafa RSI: 0000000000000002 RDI: 00007f57c1b1eaf0 [ 876.282948] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 876.290220] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 876.297495] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 03:36:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000023000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000007004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:43 executing program 1 (fault-call:2 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:43 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0x24, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) socketpair(0x7, 0x0, 0x0, &(0x7f0000000000)) fchmod(r0, 0x20) [ 876.480013] EXT4-fs (sda1): re-mounted. Opts: [ 876.495181] FAULT_INJECTION: forcing a failure. [ 876.495181] name failslab, interval 1, probability 0, space 0, times 0 [ 876.557250] EXT4-fs (sda1): re-mounted. Opts: [ 876.557342] CPU: 0 PID: 19709 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 876.570386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.579758] Call Trace: [ 876.582367] dump_stack+0x244/0x39d [ 876.586031] ? dump_stack_print_info.cold.1+0x20/0x20 [ 876.591242] ? lock_downgrade+0x900/0x900 [ 876.595409] ? check_preemption_disabled+0x48/0x280 [ 876.600449] should_fail.cold.4+0xa/0x17 03:36:43 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0x30, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 876.604525] ? rcu_softirq_qs+0x20/0x20 [ 876.608522] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 876.613672] ? is_bpf_text_address+0xd3/0x170 [ 876.618193] ? kernel_text_address+0x79/0xf0 [ 876.622642] ? __kernel_text_address+0xd/0x40 [ 876.627164] ? unwind_get_return_address+0x61/0xa0 [ 876.632115] ? __save_stack_trace+0x8d/0xf0 [ 876.636461] ? find_held_lock+0x36/0x1c0 [ 876.640563] ? do_syscall_64+0x1b9/0x820 [ 876.644651] ? perf_trace_sched_process_exec+0x860/0x860 [ 876.644683] __should_failslab+0x124/0x180 03:36:43 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xc8, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 876.644706] should_failslab+0x9/0x14 [ 876.658185] kmem_cache_alloc_trace+0x2d7/0x750 [ 876.662879] ? __might_sleep+0x95/0x190 [ 876.666880] apparmor_file_alloc_security+0x17b/0xac0 [ 876.672091] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 876.677663] ? apparmor_path_rename+0xcd0/0xcd0 [ 876.682385] ? rcu_read_lock_sched_held+0x14f/0x180 [ 876.687426] ? kmem_cache_alloc+0x33a/0x730 [ 876.691763] ? zap_class+0x640/0x640 [ 876.695496] security_file_alloc+0x4c/0xa0 [ 876.699751] __alloc_file+0x12a/0x470 [ 876.703568] ? file_free_rcu+0xd0/0xd0 03:36:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfff, 0x2000) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000180)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0xc) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x3d3, 0x40000) sendto$unix(r2, &(0x7f0000000100)="ff538b5f6cbd0b45e0a23513e0fc3d6792e02d32388ba95bed8db8f86cebeeabf6f51165508fd8893542212be60c9db60ccd6735f12053585695520b91b21ea08d51bb2479a45aa18450ac72afcaf8677bce7b8303eabaacb54bec16c7bf069c98889762ebdf93afea", 0x69, 0x4c000, &(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e) close(r0) [ 876.707492] ? find_held_lock+0x36/0x1c0 [ 876.711587] ? is_bpf_text_address+0xac/0x170 [ 876.716129] ? lock_downgrade+0x900/0x900 [ 876.720294] ? check_preemption_disabled+0x48/0x280 [ 876.725330] alloc_empty_file+0x72/0x170 [ 876.729413] path_openat+0x170/0x5150 [ 876.733232] ? rcu_softirq_qs+0x20/0x20 [ 876.737213] ? unwind_dump+0x190/0x190 [ 876.741130] ? zap_class+0x640/0x640 [ 876.744866] ? path_lookupat.isra.43+0xc00/0xc00 [ 876.749652] ? unwind_get_return_address+0x61/0xa0 03:36:43 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xc9, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 876.754602] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 876.759668] ? expand_files.part.8+0x571/0x9a0 [ 876.764270] ? find_held_lock+0x36/0x1c0 [ 876.768355] ? __alloc_fd+0x347/0x6e0 [ 876.772195] ? lock_downgrade+0x900/0x900 [ 876.772213] ? getname+0x19/0x20 [ 876.779747] ? kasan_check_read+0x11/0x20 [ 876.783910] ? do_raw_spin_unlock+0xa7/0x330 [ 876.788352] ? do_raw_spin_trylock+0x270/0x270 03:36:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000000000000000001c4d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000006800000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 876.788370] ? __lock_is_held+0xb5/0x140 03:36:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x007', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:44 executing program 1 (fault-call:2 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 876.788385] ? __check_object_size+0xb1/0x782 [ 876.788409] ? _raw_spin_unlock+0x2c/0x50 03:36:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000900000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xcb, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 876.788427] ? __alloc_fd+0x347/0x6e0 [ 876.788460] do_filp_open+0x255/0x380 [ 876.788477] ? may_open_dev+0x100/0x100 [ 876.788511] ? get_unused_fd_flags+0x122/0x1a0 [ 876.788529] ? __alloc_fd+0x6e0/0x6e0 [ 876.788547] ? __lock_is_held+0xb5/0x140 [ 876.788570] do_sys_open+0x568/0x700 03:36:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000fffffff4000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 876.788591] ? filp_open+0x80/0x80 [ 876.788631] ? trace_hardirqs_off_caller+0x300/0x300 [ 876.788648] ? do_sys_ftruncate+0x449/0x550 [ 876.788670] __x64_sys_open+0x7e/0xc0 [ 876.788692] do_syscall_64+0x1b9/0x820 [ 876.788707] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 876.788727] ? syscall_return_slowpath+0x5e0/0x5e0 [ 876.788743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 876.788763] ? trace_hardirqs_on_caller+0x310/0x310 [ 876.788782] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 876.788802] ? prepare_exit_to_usermode+0x291/0x3b0 [ 876.788826] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 876.788850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.788863] RIP: 0033:0x4111a1 [ 876.788880] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 876.788887] RSP: 002b:00007f57c1b1ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 876.788898] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004111a1 03:36:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) 03:36:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0xc0000, 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) 03:36:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = fcntl$getown(r2, 0x9) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f00000009c0)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000080)="d18304d8ce6866249a0b4d2f4438dd2230c84ebe976926de8d849fadf4a0d76748ed2c302d9d407b5498d083ab6f74854ed78327961862a1d5b2c6c807cfe8f1e66c52d272b38d9f7b1dc9bf9ac4e38c98375fc8971f6328bca00321f9d95ce7726f784266126e0b9c33d0fbdbfb9628e3e297166d46311050e71e01b3c69e39a3756435d891dcaf27a92b3e0e319d8b31d0ee002eaee2bb92f01f78301fb4842c1202132d5cb39c93b7e911f8e15b26e53c2969f01a7488009fc0d39aa31f84e0ec3a43a571f6b1093006a36cde47d0", 0xd0}, {&(0x7f0000000200)="76750c9871d089beb9835742bc5272813b2830cd4a9e13a113c29116af7675aa63ac82ea52ac231273e414b4699651131cc1cb4708b81d651d6628c476adec1af0ec2d7286e3a713cd03380319bcabeec7cf6a6964e4b737897d474b91be9cef7b045867703dfea7181c8a1b6621faed3f", 0x71}, {&(0x7f0000000180)="198f4f7ba562a044403cc201977ec6d2e3ee055f5afd886404ba6c0f81c5ccbaa8a43d5abc2e6d1b2ff7f0e6d779033f3b3a30eeec3baa6ed2", 0x39}, {&(0x7f0000000280)="0ff7408d7d794f3aaa601f83a97f84179a49b88d1a17ba89597047bc46e71f5da6f99b99d16688e531de80ae8c0e6255243f146850539f845047ea02ae7f3bd17b7482cc93298ef07cf814477925643ce6b6543bee1984ff82276fc8017c04a35d8d3dcb9e0d6911551c6e37d56b3cea18a781b19e3ce6bf5182a440216f3c020147834ab659dfc884f56007c3ab1c9cf371213f20d18939f59c98489899ed60b5f69293e3abc9191a62e070e222584c5c7d7fdb3830050320003000ff6af714153c119c910d08", 0xc7}, {&(0x7f0000000380)="047765cde76dddb657d1601770a104a4f27016c4409ad0ffe5eb6def3c35a393dbaa95cc082aa7eaecaa482d43eb4f5d06d5631d23201375b97f94d30bb4995cb02fbda9a02c5d", 0x47}, {&(0x7f0000000400)="62303f18427948116a15d2568a4dd7570837e079231e54d3557e47e7f5c65cc456726aaadf0b3a6821fc86a5bb36ae1f0584239b604cde12e59116513fc2a6921d7b478fa442964eeaee8a9915789303639745c20db4c4fbfad16a04d20c70f85d8f2de14175d1f364e86e5018755a1d445526f8b733deca265d99a5f21cbc0c4a5619b3632715e5e7b0e65f416567d34850d82ca5d3e46896f00a64d6c28e03646d6a839c72a49cc355a493748c4aca7a4bd219c5b216df7775145ac098266349b51f7b6fc5fb6d0eb7e1032ea8fd5f897d7c8d082d69691e02de3186fd716bcf14", 0xe2}, {&(0x7f0000000500)="dc96f46740bbd0fa1153508fff64cc6896a89894ff0c9f256cdc2abc927b23d023771651b797e09986617271b2abe57be3be894d2c1769d5", 0x38}, {&(0x7f0000000540)="460e973b77ac82598ec28dc8adc281046893cc27d94d276a6012e25d1ebf76ea5a367210d60bbab02feb5926497f4f230b6cb6f1efc4c640cd6e0625e2cd06ad1b1e219f3355710be2192f11fe6ea5415ee6745fbfc2245d01c63d92902cddab70e4da7640a2358d4a622f151a74e94f36d84795ab776f8e0b4cedcc1596a156eccd4f5b53159ce5e59a9468f2138d2d11cd7ec09f0ba97a07ff3fbd3bf63de907610b239b6af3374fb37716a244e2ddbd287ea471d0cdbf192a", 0xba}, {&(0x7f0000000600)="50e81e3112b7722aa07502020c62942718915517992d1c6c194d7917bf8c174d7aed8b80940385cc9896a8028b1322db37086e37c51d2c6ad49bdde439247497f157c28ae153b08a6d54d44d8ec6e869ba3c8ea982443ace5257172596ed35b2996cc932ab7e1b84e0228a878332f6d3d83f0abe65", 0x75}, {&(0x7f0000000680)="873b775ad018b64ea262b1534b85f86b38d630569fc59173b9250fe5fb9744bd8828c6892a0124d85a32fcb3c990536bfa2a465a876bf9c93e4ce32f947f3ac21eb41b1f60b46ed7c00706cb7e67ebd842c55a7d95e60245a89905ee31905d0f181196b74f9f6774620bebbc", 0x6c}], 0xa, &(0x7f0000000940)=[@rights={0x20, 0x1, 0x1, [r2, r2, r2]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x28, 0x1, 0x1, [r1, r0, r2, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}], 0x80, 0x4}, 0x840) close(r2) [ 876.788905] RDX: 00007f57c1b1eafa RSI: 0000000000000002 RDI: 00007f57c1b1eaf0 [ 876.788911] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 876.788918] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 876.788925] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 876.796796] print_req_error: I/O error, dev loop4, sector 128 [ 877.163896] FAULT_INJECTION: forcing a failure. [ 877.163896] name failslab, interval 1, probability 0, space 0, times 0 [ 877.201725] CPU: 1 PID: 19760 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 877.210243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.210266] Call Trace: [ 877.210292] dump_stack+0x244/0x39d [ 877.210331] ? dump_stack_print_info.cold.1+0x20/0x20 [ 877.222275] should_fail.cold.4+0xa/0x17 [ 877.222300] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 877.222321] ? down_write_nested+0x130/0x130 [ 877.244699] ? down_read+0x120/0x120 [ 877.248438] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 877.253994] ? zap_class+0x640/0x640 [ 877.254009] ? lock_acquire+0x1ed/0x520 [ 877.254120] ? lo_ioctl+0x8e/0x1d60 [ 877.261719] ? find_held_lock+0x36/0x1c0 [ 877.269393] ? __lock_is_held+0xb5/0x140 [ 877.269428] ? perf_trace_sched_process_exec+0x860/0x860 [ 877.278950] __should_failslab+0x124/0x180 [ 877.283203] should_failslab+0x9/0x14 [ 877.283221] kmem_cache_alloc_trace+0x2d7/0x750 [ 877.283242] ? check_preemption_disabled+0x48/0x280 [ 877.296722] __kthread_create_on_node+0x137/0x540 [ 877.301592] ? loop_get_status64+0x140/0x140 [ 877.306017] ? kthread_parkme+0xb0/0xb0 [ 877.310022] ? __lockdep_init_map+0x105/0x590 [ 877.314535] ? __lockdep_init_map+0x105/0x590 [ 877.319056] ? loop_get_status64+0x140/0x140 [ 877.323483] kthread_create_on_node+0xb1/0xe0 [ 877.327987] ? __kthread_create_on_node+0x540/0x540 [ 877.333012] ? kasan_check_read+0x11/0x20 [ 877.337177] lo_ioctl+0x7f6/0x1d60 [ 877.340732] ? lo_rw_aio+0x1ef0/0x1ef0 [ 877.344712] blkdev_ioctl+0x9ac/0x2010 [ 877.348613] ? blkpg_ioctl+0xc10/0xc10 [ 877.352505] ? lock_downgrade+0x900/0x900 [ 877.356654] ? check_preemption_disabled+0x48/0x280 [ 877.361679] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 877.366610] ? kasan_check_read+0x11/0x20 [ 877.370775] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 877.376061] ? rcu_softirq_qs+0x20/0x20 [ 877.380050] ? __fget+0x4d1/0x740 [ 877.383518] ? ksys_dup3+0x680/0x680 [ 877.387283] block_ioctl+0xee/0x130 [ 877.390917] ? blkdev_fallocate+0x400/0x400 [ 877.395243] do_vfs_ioctl+0x1de/0x1720 [ 877.399143] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 877.404689] ? ioctl_preallocate+0x300/0x300 [ 877.409109] ? __fget_light+0x2e9/0x430 [ 877.413093] ? fget_raw+0x20/0x20 [ 877.416553] ? rcu_read_lock_sched_held+0x14f/0x180 [ 877.421573] ? kmem_cache_free+0x24f/0x290 [ 877.425817] ? putname+0xf7/0x130 [ 877.429274] ? do_syscall_64+0x9a/0x820 [ 877.433250] ? do_syscall_64+0x9a/0x820 [ 877.437230] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 877.441821] ? security_file_ioctl+0x94/0xc0 [ 877.446237] ksys_ioctl+0xa9/0xd0 [ 877.449699] __x64_sys_ioctl+0x73/0xb0 [ 877.453619] do_syscall_64+0x1b9/0x820 [ 877.457510] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 877.462879] ? syscall_return_slowpath+0x5e0/0x5e0 [ 877.467808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 877.472661] ? trace_hardirqs_on_caller+0x310/0x310 [ 877.477691] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 877.482718] ? prepare_exit_to_usermode+0x291/0x3b0 [ 877.487743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 877.492598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.497789] RIP: 0033:0x4573d7 [ 877.500986] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 877.519886] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 877.527608] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 877.534878] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 877.542147] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 03:36:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xb, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x2, 0x3) close(r1) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x40000, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000080)=@fragment={0xc, 0x0, 0xd64, 0xd2, 0x0, 0x7d08, 0x64}, 0x8) [ 877.549414] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 877.556684] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 03:36:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0xffffffffa0018000, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) close(r1) [ 877.691467] EXT4-fs (sda1): re-mounted. Opts: 03:36:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00006800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:45 executing program 1 (fault-call:2 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:45 executing program 0: r0 = epoll_create(0x3) syncfs(r0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000024c0)='/dev/hwrng\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000002500)={0x0, 0x3}, &(0x7f0000002540)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000002580)=ANY=[@ANYRES32=r2, @ANYBLOB="05650900020036f745ef6bf03bcbc399ffff08006f00"], 0x1a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$vsock_stream(0x28, 0x1, 0x0) close(r5) ioctl$int_out(r3, 0x2, &(0x7f00000025c0)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000002600)={r2, 0x4, 0x431e}, &(0x7f0000002640)=0x8) writev(r3, &(0x7f0000002440)=[{&(0x7f0000000200)="fe3100db29c1245d6d099be293746b1d7c370ff03fe1b78817f3aee6595f9b8f7ff069a092648a583de58ab94029a719a2a456457dcfe4077886fdee27e31373816f57b09f8293c984bac8d04b56b5230fd1c4b28023f4afe7619dd51aa36ad1319e6e825ace00d4a009e0840f41856618a499658d087f7cc4fe73de1cae87057b6d88583b15c0025ccca02bdc330ffebe649373e2f4eea78776634ce4e42dc24242bcd6388cbd100e788ef8e1814cc9e27749332c1ac8c1942d89199ddf587aa2fbb25ec0255bd4e89ab2a305b282f4f77999fc53f5da7f3ac1e76677313da5d0c8f99664de5e7de5f8b56134916a90cc1c458049d67a429eb5fe8f6b1e39c1bb66f38fcbc181c6546548a395729fb5b7aebb6e2ffe0fb3235572561e211dee61b705614757074d754ca548532291460e9b754ac31deb0e8b33b962f94be70c03ad11dd80f429b41f2fd59f50d9365ff979db8f86cfd8338f152d82f55a3bb0ba538e4cdb47ad1eb00b39f80816563362850969ada12988409ad21ed1f27119e55367b819a927df3033d634e6237a056c6645ca1e969356e85e1149c5e221418e1c74ab8478ac3d47efeac558cfa06c7102782dd546ef336066aa240c64c07a22a5cec36846afb11bfe5fe86aca132f5784c7391476955a5e7dd58fc637218c3354bfa80560e8e7f073189e826cf4bfc29b570a4b75ad1ad0e69c4da79c69bd3d955528f957f491297370012abd42900248595ad175554703a783ddf476b2a624138caf46a2d53c73713b4e7c2ac4c97adecf6aa905afe8b55d93ac314feb28bff54ea3c27aa87f32e3966864f5e92195beddf67a0d231b65d06c85b5243d3590fa550550aa2d463c2af7c1f66178b8e7ca44cd2e92cfc4115ff29258a3a6d623cc269cce38f9666eca541347780b13be3c98e488fdb09f662d22fe17f996fb75c317e54db25f1711b12e5d9f7a05301252cff4cf7828939fe5c50569c2a1d20ae085d3fcd51a8f3c40eaba6691cbd81fbc0a5ccbe7c273b08edd7c97f2cf8e9ddfdc034ed478f127fea9b2c2d635e0f1c7c8a19cf307705e53bffd82af2f36027f718f960885bb925edf7dcff3654b3486c88142c11989beb28c0de08238e58bb5a61a802d493de1b54a8890766ba91fbd0fdfa520210ffe5ad7b37fbad0959173743349088394e06abec83e9ce0b845047697793cbd4635307201879eb7a488894da8b7fcd37780ae7401f854d9f5e44c698403605d519caf8116e3144fda70ed2b8b2536e04511b7a746b5eaeab4729916e9b9b9478499272d4d5e2f840fc1d01919d8b2b2cfce3ccc72d74e588f7450529db426e5ee2d3f3324b8db2bc084a09faa3b7c96d99fd9decd1cc0f6035714493374255e5b2a0f5fbbacd8abb02c86752405f3c6f2a687c3c39f11f73bf5e2aafb99e12b604f38486e94e318c4fc65724c1949314f5f491918cd231ba1397aac46d5853ce6213d83ebe28f6e88f0034a30c7f17334871e9af6d8f4b28f6953eeba901588a8bbb74411bfb2029ffedf6515408d08118316f9591f747a9231e87ec0a9f622537b7cb86664a75a1d4d9a2c6fef6ecee7baa5319cbec92fb9ede1e31f1d0d44d61e038b6878aafbfd0871fcaf27d99cd0c2d8fdfe41a8ddcab93f58d591d41e95a2a563d995a112a9aac03cd864613979683090914247501acd9ec69426fccd18a03bc282971584e98ac955a347e26d211925012a863194138ac86ece3d0b41a838916b3671c29619cf7db0176b6d8bcc267e23a733b8ec69edc46bfd21b5922d1fc885dabd360c6dff0dc8f7adf8f93c117e96e7e99a142a17cb5a41c441dcd034244e82da6ef52681bf4ea91cf01579260cf7e97cad688d45fb5f1617896524c2659a31e8a7834f6f46563d8f0906afa7646a06e7f592f366c680020848fd666542147c094faa7c11a27815c92fb1b5b15afa8759caf28ea4151b6f3108f78c9946b3121ff7aeba6e94fc644c664b268b698c1cdee3531bbb1851a1d049e99a2b998b7db8113e6f3e2e73a1dd1468feff616ea275765957ad2158b61422a86eaada311730f9ecd8a41b477e91f9744dc6143cbad7700a6935f34e5903a53309d19a3be43fd50b0400b65493041d505260e0d821205c7708b2e5676ad1b3f225f353cb82d6b8c8ae3a06dd44b0d384616aec3b5c2915c680be51aa7d1e92e6267c45a34ec3155a98cbb77695be5b1a7caa12f26a42d0724d3acbf2c2ce7a4c408986c8a4c2275e9414bb1f6409de7c0bab85283a42e0e279321941ef1ebb6956e8efd3feea00ba8f59d813994c3a975daf7e5ae19f25f0e4f7bee94e9a0515d3f23445dc17c853e392ef46e260a53c7faa343d8b07d286170d5d4f8c79d40f06ddcf7b4ccee18252fa212d912ed85a6cb124f3abf133a46f58bcee1c970067e47bb7c7d349cf93a7f2da904724e2096214db77f0e05fb3d9ba883a648bd5d09351527cb465d26e13da31a27532a075f5e2cf987d8d1da0c543588be56823b3f3f8c4b96dc2330522c9efbecccb0b2c5a5683e50ec926d3954c009a04407deb249c2c6ed372aeff504a13f5f25f8bb4004b7d70297f5728e5613a85b3a1ff04530e1649642dd9ea42caebe35e305a4672beac2dfc5dae914b597fb9411a9b0c9bd43060e5704e4de186fa11efe717f87bd47ed7bd99ff2bd15bb31ad7db280bcc82fe013550954b72a34567053fb07f3ce0ea1ec28a7f5698def2055e6cc6c9ffe4456526338a21f55d649adf957f84b66b47d6634260d5e8197a2436d92c3fc0aec5a0fcfa9cb0b611d0d1b84c49b5193e753f219d3b5e38bd0d49c14f1b6fa2a9c8ee96e88f1a226eb6ec86cbd7fb5bfcde6e5b97b9ee292b2bd372be1b3ba08f6e4c518fcb8cdff3b6f969fad121b35466662fe31c8bb34321a5d2ee7479d635889a1508b6ff78b1937f2cfdb4cbb239d8e745437c173443986df9979295869a8761b0ff8b5c289cb5ce8ad1f2526433e63769c0a5e29d283255b51122803ac58a2e03b5255ccb5137c369159efc7687108d8afb36cf0c3330772f82ce3e74c178cd9ad2f497f789d148d833f5a4b5df75684406c2e2863d9508367f8bf008c3a98fe0eae8146a54fe560e3ce8d174850d80a8061504540f9f53b99affd56ca63e46c063fcf02ec12c1470707089ee3f09a74022eb80a874fa1f6cbd611ca84e845256eaf11ff02703f0aa678c9b1ad6e654f5696ea7287fbd43655bdaddd82b782a3c3c1a0be84a59bc024b1987edc582193d84333ae49be2d3916962b59c6b1c39affe77c37d8dd469c9b5f7d78eb2ac787b74bb8fb901ebf80b01ce471c04b58d4c18b18ff166e60e9f9a0c8877553304eecd9f50a081289b36ad84e54a28ec53fa9dc6c7ab8ce6fe21c03e7dd6beaa98f82a89bba9ccec3b04e601c399a2f6e3ff38fa86191f2823d6bb37ce89f132a14df2fad9f8310f85ead83848b2cb28d9961ef104ac7220f43891c6feafb4f0a5ec8f7b336eea0d3f71aa4984a6a5e6f3f0f754f78a4f218f3ad1937baaeb7dfbdfbf8ece4be1dc04ef987c3c0cec413ff7d56e5d23eddc005e1d3d9efd936d46dcd64089fee22c615d70308b7f5f3c0c87808a64048c1a9dd9e4df91482002db6d9d120324636f90952e8ada36b2667f14d935e94cb56d9a1fda1f7cf412aa3dd7eb5daf808ad696b8e5259a8056a143610a8eddfe70ed72c3e2fc2a44fb7210250506dbbb1c3a59cdbbd5ad17e6a18493ba5a7e44567b919608cf373ab18e1b371628790bcd32b9ec953a14b25e58c0a0ae29016c3d4c1939b8b1b3fc71893b277b502fcab28d22ba6950bd691153e2a0d84e2375ae009956dc2a9c7b9802929a3b008f2cdfc7d6065b1101c33ae3f45b12eb4785a5ad76550fa7bf0cb63270ef27c6602abbc65111090f073d22b818cdd45785571d2ab537e43d311b81558546b9b7f49ab9f5127fea0e4561a6224d31c4ebabdefc393b9e4542a5108de0e4139c84df74a4dfd337d9ba4c388767c23e698d40c45077df0006b878194059a6a1005add5e47d5da5881f7c7ca78640127c80a4ed7847b80fd44803f7067ab97accfb1b75dbbb453ce9dc0d555bc26af4d3f10ee2614d93ca4e743c2739900df09c6f43f1a272a0cfbf8bd6ca257eb3e1aafdaa506df36fb6ee46dc8c75fd7d4355c3ee3035835571a0700ceb7b2fed654d90b4296b0c12dbcc7f1c8129c1542b04029eea49e493747dac275c568ecfd2f6003ac1b12dde99644d8e7bf6ed2db1ee4ce951472e0b25d56d34062029a31a9eaade08053de9d0c48d899f96fc3050bc8ad50b766a2158d6f2df0fc445beca337be6466bbae2ea346e8bdfa524c0fddadf85995eb3caae6e8c9e84af681d0dc68940f2e95331aa4cb556437b6834782cc37d922a05466787d42c4655a80517c0f5d7dcb3a4734f79520f45a37bf40d76852083104e6d8f12ed0009fad7332173734b64377588e38ad2f09f65797934c5f42355195a46e6a2ec17a75d91915b93fb041f588c14ae61a74b17f4d94c229775f5b2fdd75efe0947eed1f68a238dfc4393c53f0caf839173145c92ac324db5ab4c65ed0098fe8917408aeb421a8fc0abf6e451f2fdf3f1712fd275483241457d90f794dcbca7fd1598b46182f738a47e63ad2608b196a0e09d0b2ec3ec1adfa1978930e7598075c0641aa4c5264de5aeb23feb700f8f1b80ca989ffd6f527a4c6eb432e92b489b448acf8de46a721c9f57efe436291ba8ea7d69f7d6770f7a2c9bfcaf5e64523b3d29287f0ce511bda528ef64c568c4bb5ae5e46bbe0c60a3304f837c14cc71e06db819b7d85f005c31330056b3f851e33d3e08e7f9287cf9c17a95b224a9067f2fa67905e1ad6fcdaa00785c974a57423a7dbbacf80bb15131c0e88ca631acbdde13f29e34ebc8b33c636e0ab5d733461d3ef54caff4f08917b97f808449896faed8702efd91063eb48dadb380cad762c54e8a2af932b6ff149d995702c2bd8fc84b55412929ed4effcdfeeb0493aafec9a21eb1dec64cfc82ae99208b8a6206bddc182b1c2929ab93cb028543b3260f82418debf8e02a4084990c148ee47d3b42dd11176fd06552b50e2fe211828f9619c071bcab9648cef5e09f1def5c0e78ece0ad839ae115aa5834a13a993f38dfc4dcb014af5da19c92b09f59861e3fc78a6aba3a1a783fdc9986bb4e5efef0d07c4d5d3e78c629dfe1ca91c4116266de81b1ed70f506ef063ab453f8e3cee5bbc57321d14a59da333b3c2a8da2fec22b7e80d353a20fcca7391e848cffe5aafecd23c76e9242625dd3cf73ac6834ea10461729cc8fd17873d48be0e50967c46c603e3de99822670a6209a707fa677dc38a6cac1bcc44c6a20323e6257ba12454cad0303e9d4bb15334a2cbd64a02ace2dd9ba8a8d56cc2809047eda5d01f2bd52b0a6ec46d59dec4f7f9b8032e324c4d501d3cc00688b0c63768eb0f1282e5fe6b15426959a115d2f3aca30caec97fa53ede3204a3e44ab732a316a7df860cff15e81f717fb5c0b741d165889429a4f933df71854aed43405ec29c1f591539b09222faa7996ce28c4b5dc99469a79a456b4bcb3198fae2c927c1aed7fd3d0b415bebb9b3e804711b923763a25d360a22e4ede22ec65c178f5c2a90ffe677aa2d1162ec815002b30cf6bc9aa95961d618a6d6db9fcd92ae9380e41627a4ba18274e5eff22f50ccb49ee6a3e059e1fe6f402d9441f9707f0010aea663e4251b9a841360994277d960872ebb09c57186f0278bd7e751a560efdb6a2ad8", 0x1000}, {&(0x7f0000000000)="8ba21d2e858add5e5da3a0fd861ef597ecaad9b296c5563989352a5bd38de05a5018bda482602bd87d563d0cffdc1c002ae39b0567b8336f005a0f297b7a059c839474d8000cae0d0cd65dbd39222319ccacb3e132baaa96154724466b93bba29274ac1cb7a75653dc7d95ae72b03d6407c9da33a6a77fecfa79a7b3feb26f93db415dcf876d7d1c9d8a9c6ef9e23fbb5f831f97f54950daed95033620cd19615cf0fa502918c67f8aa3ffb74170e263f3487cb9cf6f99fef4c83a20ae9984a42525604155465e772805e22a8378a1b9899d92bc", 0xd4}, {&(0x7f0000000100)="40305fe325321d473dbac7734ba8e79713b3b3d2578093d148d38391489bba3e424df170778a07202172c36302c00b78ca3d2cd3a5f15b6978d9ed15baf782a1649ca561af4d1d9b3c5def8eb84c19ebc7e0aad09ada7a04bc92f6e37f6046ad96f8b0949f63baef614dd8e69eee3c7449a24b87cc8d1ba4d4ca5d4ffe6657d9d6171154381a3a14e16b7c539f27085897e595e2a5784eb77f77944879", 0x9d}, {&(0x7f0000001200)="63b6520c45a09ade9c4ab91e00c941b9dd1b3444d87eeb4969e6c8247d1ac5b12990c8bc07ebf1430eacbd0417aef0a65b4f0a", 0x33}, {&(0x7f0000001240)="626868f59ae713a4d8ecfb8477cdc1add2c47d6c15782633663ec2c3aaa5d466491329fad9e1145be5f48b0aa520cfa9564955ce48592efb7f8aaff953d61e4b067eea6b09a595380ea80f09755ce155e80d7319eab15a5e9be56e11b8ba1a0c212581ace0301dfe9a3662034b6d35203dfdebedbedd07e9474f5502824942082f1b0a7d8b84d0b2bd98ecd78e51347f00959f40a5577dc1d8200d1d276b9d65d541e088d9b0cdf0949c63250c765fe765f02f76e78cd48844b6367ab80edb", 0xbf}, {&(0x7f0000001300)="008c452fea657e41e1cd0ff0b63258a807973538cada48f8b0b9f45e0c21bc9b097fe6be85b9fcb0b9372a5ebf528387cdfe5ba1258ac8d3be00ed85f6290f0a0fba5f9e37d15886bba3745117ef7a05fadda2b79fbafb2bc87919263f71ea37cc4647481eceb353393b6a5da386d6ddee6b58a86981d9019116a71419b2e811a8d9eedf4e784b5a7744fd8af7ec6468dada6659cfaeff8d32b2092d9e52384b01bc95a481c9f89ada374cd969b491c54aa70c2186635d125f67e676f1aec1f68789807adc4a868780b5e6a87b5f506cd5d1", 0xd2}, {&(0x7f0000001400)="b749d14c9faae5d2c750496922d2eef237001a6dfe8e9ff5a585f6b3a3ecdb71d9695fda8ff8b267ba51ddc9", 0x2c}, {&(0x7f0000001440)="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", 0x1000}], 0x8) 03:36:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00e0000080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:45 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x100000000000000, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000074d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) r2 = accept4$inet(r0, 0x0, &(0x7f0000000000), 0x80800) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x1ff0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x4e24, 0xa3, @remote, 0xfffffffffffff528}}, 0x4, 0x3, 0x2, 0x20, 0x29}, &(0x7f0000000180)=0x98) 03:36:45 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0xa4ffffff00000000, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 878.027056] EXT4-fs (sda1): re-mounted. Opts: 03:36:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000005e1c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00004800000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 878.103560] FAULT_INJECTION: forcing a failure. [ 878.103560] name failslab, interval 1, probability 0, space 0, times 0 03:36:45 executing program 0: r0 = creat(&(0x7f0000000180)='./file0\x00', 0x20) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) close(r2) [ 878.152370] EXT4-fs (sda1): re-mounted. Opts: [ 878.159945] CPU: 1 PID: 19837 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 878.168476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 878.177837] Call Trace: [ 878.180448] dump_stack+0x244/0x39d [ 878.184104] ? dump_stack_print_info.cold.1+0x20/0x20 [ 878.189326] should_fail.cold.4+0xa/0x17 [ 878.193414] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 878.198534] ? down_read+0x120/0x120 03:36:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001940)='/dev/autofs\x00', 0xd0000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000001a00)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b0000000500000010060000c0030000c0030000800100000000000000000000400500004005000040050000400500004005000005000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB="000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055e48335be189b6e607137c48a0d3cc712dda2c97672e875976164cd34c0ebe81c4c50abc43c4810c2137de19c8fc01a3fc6fd24ff9898cc"], @ANYBLOB="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"], 0x670) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) 03:36:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) recvmsg(r0, &(0x7f0000001380)={&(0x7f0000000000)=@hci, 0x80, &(0x7f0000001300)=[{&(0x7f0000000080)=""/148, 0x94}, {&(0x7f0000000140)=""/2, 0x2}, {&(0x7f0000000180)=""/48, 0x30}, {&(0x7f0000000200)=""/161, 0xa1}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/60, 0x3c}], 0x6, 0x0, 0x0, 0x9}, 0x2000) close(r1) [ 878.202269] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 878.207826] ? zap_class+0x640/0x640 [ 878.211559] ? lock_acquire+0x1ed/0x520 [ 878.215555] ? lo_ioctl+0x8e/0x1d60 [ 878.219209] ? find_held_lock+0x36/0x1c0 [ 878.223294] ? __lock_is_held+0xb5/0x140 [ 878.227391] ? perf_trace_sched_process_exec+0x860/0x860 [ 878.232875] __should_failslab+0x124/0x180 [ 878.237135] should_failslab+0x9/0x14 [ 878.240958] kmem_cache_alloc_trace+0x2d7/0x750 [ 878.245644] ? check_preemption_disabled+0x48/0x280 [ 878.250689] __kthread_create_on_node+0x137/0x540 [ 878.255559] ? loop_get_status64+0x140/0x140 [ 878.259990] ? kthread_parkme+0xb0/0xb0 [ 878.264002] ? __lockdep_init_map+0x105/0x590 [ 878.268504] ? __lockdep_init_map+0x105/0x590 [ 878.273009] ? loop_get_status64+0x140/0x140 [ 878.277435] kthread_create_on_node+0xb1/0xe0 [ 878.281941] ? __kthread_create_on_node+0x540/0x540 [ 878.286973] ? kasan_check_read+0x11/0x20 [ 878.291160] lo_ioctl+0x7f6/0x1d60 [ 878.294710] ? lo_rw_aio+0x1ef0/0x1ef0 [ 878.298591] blkdev_ioctl+0x9ac/0x2010 [ 878.302488] ? blkpg_ioctl+0xc10/0xc10 [ 878.306383] ? lock_downgrade+0x900/0x900 [ 878.310527] ? check_preemption_disabled+0x48/0x280 [ 878.315564] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 878.320494] ? kasan_check_read+0x11/0x20 [ 878.324638] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 878.329923] ? rcu_softirq_qs+0x20/0x20 [ 878.333911] ? __fget+0x4d1/0x740 [ 878.337357] ? ksys_dup3+0x680/0x680 [ 878.341068] block_ioctl+0xee/0x130 [ 878.344702] ? blkdev_fallocate+0x400/0x400 [ 878.349042] do_vfs_ioctl+0x1de/0x1720 [ 878.352934] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 878.358462] ? ioctl_preallocate+0x300/0x300 [ 878.362875] ? __fget_light+0x2e9/0x430 [ 878.366845] ? fget_raw+0x20/0x20 [ 878.370293] ? rcu_read_lock_sched_held+0x14f/0x180 [ 878.375315] ? kmem_cache_free+0x24f/0x290 [ 878.379575] ? putname+0xf7/0x130 [ 878.383048] ? do_syscall_64+0x9a/0x820 [ 878.387028] ? do_syscall_64+0x9a/0x820 [ 878.391006] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 878.395613] ? security_file_ioctl+0x94/0xc0 [ 878.400062] ksys_ioctl+0xa9/0xd0 [ 878.403559] __x64_sys_ioctl+0x73/0xb0 [ 878.407441] do_syscall_64+0x1b9/0x820 [ 878.411327] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 878.416707] ? syscall_return_slowpath+0x5e0/0x5e0 [ 878.421640] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 878.426476] ? trace_hardirqs_on_caller+0x310/0x310 [ 878.431492] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 878.436511] ? prepare_exit_to_usermode+0x291/0x3b0 [ 878.441541] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 878.446409] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 878.451604] RIP: 0033:0x4573d7 [ 878.454788] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 878.473682] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 878.481399] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 878.488670] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 878.495927] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 878.503189] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 878.510462] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 03:36:45 executing program 1 (fault-call:2 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:45 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0xffffffff00000000, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:45 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)='\x00\x00\x00\x00]', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000004000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:45 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0xa0018000, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 878.787276] EXT4-fs (sda1): re-mounted. Opts: 03:36:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00001c5e000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 878.817030] FAULT_INJECTION: forcing a failure. [ 878.817030] name failslab, interval 1, probability 0, space 0, times 0 [ 878.828844] CPU: 1 PID: 19886 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 878.837361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 878.846730] Call Trace: [ 878.849348] dump_stack+0x244/0x39d [ 878.853009] ? dump_stack_print_info.cold.1+0x20/0x20 [ 878.858220] ? radix_tree_tag_set+0x3d0/0x3d0 [ 878.862740] should_fail.cold.4+0xa/0x17 [ 878.862767] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 878.862861] ? kernfs_activate+0x8e/0x2c0 [ 878.862885] ? zap_class+0x640/0x640 [ 878.879867] ? lock_release+0xa10/0xa10 [ 878.883841] ? perf_trace_sched_process_exec+0x860/0x860 [ 878.889320] ? find_held_lock+0x36/0x1c0 [ 878.893395] ? __lock_is_held+0xb5/0x140 [ 878.897467] ? perf_trace_sched_process_exec+0x860/0x860 [ 878.902939] ? find_held_lock+0x36/0x1c0 [ 878.907011] __should_failslab+0x124/0x180 [ 878.911241] should_failslab+0x9/0x14 [ 878.915032] kmem_cache_alloc+0x2be/0x730 [ 878.919167] ? find_held_lock+0x36/0x1c0 [ 878.923232] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 878.928255] __kernfs_new_node+0x127/0x8d0 [ 878.932491] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 878.937254] ? kasan_check_write+0x14/0x20 [ 878.941479] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 878.946422] ? __kernfs_new_node+0x697/0x8d0 [ 878.950818] ? wait_for_completion+0x8a0/0x8a0 [ 878.955392] ? zap_class+0x640/0x640 [ 878.959120] ? kasan_check_write+0x14/0x20 [ 878.963361] ? __lock_is_held+0xb5/0x140 [ 878.967410] ? wait_for_completion+0x8a0/0x8a0 [ 878.972007] ? mutex_unlock+0xd/0x10 [ 878.975727] ? kernfs_activate+0x21a/0x2c0 [ 878.979968] kernfs_new_node+0x95/0x120 [ 878.983953] __kernfs_create_file+0x5a/0x340 [ 878.988355] sysfs_add_file_mode_ns+0x222/0x530 [ 878.993018] internal_create_group+0x3df/0xd80 [ 878.997614] ? remove_files.isra.1+0x190/0x190 [ 879.002192] ? up_write+0x7b/0x220 [ 879.005733] ? down_write_nested+0x130/0x130 [ 879.010149] ? down_read+0x120/0x120 [ 879.013890] sysfs_create_group+0x1f/0x30 [ 879.018048] lo_ioctl+0x1307/0x1d60 [ 879.021669] ? lo_rw_aio+0x1ef0/0x1ef0 [ 879.025547] blkdev_ioctl+0x9ac/0x2010 [ 879.029428] ? blkpg_ioctl+0xc10/0xc10 [ 879.033317] ? lock_downgrade+0x900/0x900 [ 879.037454] ? check_preemption_disabled+0x48/0x280 [ 879.042463] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 879.047382] ? kasan_check_read+0x11/0x20 [ 879.051540] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 879.056833] ? rcu_softirq_qs+0x20/0x20 [ 879.060820] ? __fget+0x4d1/0x740 [ 879.064268] ? ksys_dup3+0x680/0x680 [ 879.067998] block_ioctl+0xee/0x130 [ 879.071644] ? blkdev_fallocate+0x400/0x400 [ 879.075971] do_vfs_ioctl+0x1de/0x1720 [ 879.079853] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 879.085404] ? ioctl_preallocate+0x300/0x300 [ 879.089821] ? __fget_light+0x2e9/0x430 [ 879.093795] ? fget_raw+0x20/0x20 [ 879.097263] ? rcu_read_lock_sched_held+0x14f/0x180 [ 879.102274] ? kmem_cache_free+0x24f/0x290 [ 879.106501] ? putname+0xf7/0x130 [ 879.109959] ? do_syscall_64+0x9a/0x820 [ 879.113944] ? do_syscall_64+0x9a/0x820 03:36:46 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x1f000000, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 879.117935] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 879.122546] ? security_file_ioctl+0x94/0xc0 [ 879.126972] ksys_ioctl+0xa9/0xd0 [ 879.130451] __x64_sys_ioctl+0x73/0xb0 [ 879.134356] do_syscall_64+0x1b9/0x820 [ 879.138255] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 879.143638] ? syscall_return_slowpath+0x5e0/0x5e0 [ 879.143655] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 879.143677] ? trace_hardirqs_on_caller+0x310/0x310 [ 879.143695] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 879.143715] ? prepare_exit_to_usermode+0x291/0x3b0 [ 879.143739] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 879.143762] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 879.153529] RIP: 0033:0x4573d7 [ 879.153547] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 879.153557] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 879.153573] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 03:36:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000005e1c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 879.153582] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 879.153592] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 879.153601] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 879.153610] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 879.246204] EXT4-fs (sda1): re-mounted. Opts: [ 879.256904] print_req_error: I/O error, dev loop4, sector 128 03:36:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x4, 0x8000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={0x0, 0x7}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0xd822, 0x7, 0x2, 0x5, 0x1, 0x4, 0x5370, 0x3, r2}, &(0x7f0000000280)=0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x7, 0x1, 0xffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000040)=""/241) r4 = socket$vsock_stream(0x28, 0x1, 0x0) close(r4) [ 879.300891] EXT4-fs (sda1): re-mounted. Opts: 03:36:46 executing program 1 (fault-call:2 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:46 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x1f00, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000020080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000020004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000001c00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 879.512584] FAULT_INJECTION: forcing a failure. [ 879.512584] name failslab, interval 1, probability 0, space 0, times 0 [ 879.547729] CPU: 1 PID: 19924 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 879.556274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 879.565648] Call Trace: [ 879.568261] dump_stack+0x244/0x39d [ 879.571921] ? dump_stack_print_info.cold.1+0x20/0x20 [ 879.577136] ? radix_tree_tag_set+0x3d0/0x3d0 [ 879.581675] should_fail.cold.4+0xa/0x17 [ 879.585766] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 879.590893] ? kernfs_activate+0x8e/0x2c0 [ 879.595065] ? zap_class+0x640/0x640 [ 879.598798] ? lock_release+0xa10/0xa10 [ 879.602786] ? perf_trace_sched_process_exec+0x860/0x860 [ 879.608278] ? find_held_lock+0x36/0x1c0 [ 879.612364] ? __lock_is_held+0xb5/0x140 [ 879.616456] ? perf_trace_sched_process_exec+0x860/0x860 [ 879.621926] ? find_held_lock+0x36/0x1c0 [ 879.626015] __should_failslab+0x124/0x180 [ 879.630274] should_failslab+0x9/0x14 [ 879.634099] kmem_cache_alloc+0x2be/0x730 [ 879.638272] ? find_held_lock+0x36/0x1c0 [ 879.642387] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 879.647430] __kernfs_new_node+0x127/0x8d0 [ 879.651686] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 879.656466] ? kasan_check_write+0x14/0x20 [ 879.660719] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 879.665668] ? __kernfs_new_node+0x697/0x8d0 [ 879.670100] ? wait_for_completion+0x8a0/0x8a0 [ 879.674719] ? zap_class+0x640/0x640 [ 879.678456] ? kasan_check_write+0x14/0x20 [ 879.682717] ? __lock_is_held+0xb5/0x140 [ 879.686793] ? wait_for_completion+0x8a0/0x8a0 [ 879.691406] ? mutex_unlock+0xd/0x10 [ 879.695146] ? kernfs_activate+0x21a/0x2c0 [ 879.699401] kernfs_new_node+0x95/0x120 [ 879.703401] __kernfs_create_file+0x5a/0x340 [ 879.707831] sysfs_add_file_mode_ns+0x222/0x530 [ 879.712529] internal_create_group+0x3df/0xd80 [ 879.717152] ? remove_files.isra.1+0x190/0x190 [ 879.721750] ? up_write+0x7b/0x220 [ 879.725311] ? down_write_nested+0x130/0x130 [ 879.729740] ? down_read+0x120/0x120 [ 879.733489] sysfs_create_group+0x1f/0x30 [ 879.737670] lo_ioctl+0x1307/0x1d60 [ 879.741322] ? lo_rw_aio+0x1ef0/0x1ef0 [ 879.745234] blkdev_ioctl+0x9ac/0x2010 [ 879.749154] ? blkpg_ioctl+0xc10/0xc10 [ 879.753062] ? lock_downgrade+0x900/0x900 [ 879.757227] ? check_preemption_disabled+0x48/0x280 03:36:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) ioctl$TIOCSBRK(r2, 0x5427) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x4, 0x800) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000080)={0x0, @speck128, 0x2, "c7cee040ccc0388d"}) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x6) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000280)={"7465616d300000163694d900", 0x0}) sendmsg$nl_route(r4, &(0x7f00000018c0)={&(0x7f00000002c0), 0xc, &(0x7f0000001880)={&(0x7f0000000000)=@setlink={0x30, 0x13, 0x105, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_XDP={0x4, 0x2b, [@nested={0xc, 0x1, [@typed={0x63, 0x0, @fd}]}]}]}, 0x30}}, 0x0) close(r1) 03:36:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = getpgid(0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x480400, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x3, 0x2, 0x1, 0x6, 0x0, 0x8, 0x0, 0x8, 0x1, 0x80, 0x0, 0x30, 0x7, 0xf5a, 0x3ff, 0x1, 0x7, 0x7f, 0x101, 0x8, 0x7, 0x3, 0x80000000, 0x8001, 0x101, 0xffff, 0x1000, 0xff, 0x8, 0x40, 0x7, 0xfff, 0x6, 0x1000, 0x4, 0x3, 0x0, 0x5, 0x0, @perf_config_ext={0x0, 0x1}, 0x8, 0x7ff, 0x2, 0x7, 0xcd, 0x678, 0x8}, r2, 0x6, r3, 0x8) fstatfs(r4, &(0x7f00000000c0)=""/31) close(r1) ioctl$DRM_IOCTL_SET_VERSION(r3, 0xc0106407, &(0x7f0000000100)={0x40, 0xfffffffffffffff8, 0x7, 0x6}) [ 879.762269] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 879.767217] ? kasan_check_read+0x11/0x20 [ 879.771379] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 879.776675] ? rcu_softirq_qs+0x20/0x20 [ 879.780689] ? __fget+0x4d1/0x740 [ 879.784170] ? ksys_dup3+0x680/0x680 [ 879.787916] block_ioctl+0xee/0x130 [ 879.791557] ? blkdev_fallocate+0x400/0x400 [ 879.795889] do_vfs_ioctl+0x1de/0x1720 [ 879.799796] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 879.805356] ? ioctl_preallocate+0x300/0x300 [ 879.809780] ? __fget_light+0x2e9/0x430 03:36:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) [ 879.813774] ? fget_raw+0x20/0x20 [ 879.817248] ? rcu_read_lock_sched_held+0x14f/0x180 [ 879.822281] ? kmem_cache_free+0x24f/0x290 [ 879.826535] ? putname+0xf7/0x130 [ 879.830011] ? do_syscall_64+0x9a/0x820 [ 879.834009] ? do_syscall_64+0x9a/0x820 [ 879.838005] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 879.842609] ? security_file_ioctl+0x94/0xc0 [ 879.847044] ksys_ioctl+0xa9/0xd0 [ 879.850520] __x64_sys_ioctl+0x73/0xb0 [ 879.854417] do_syscall_64+0x1b9/0x820 [ 879.858314] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 03:36:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) r2 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0xa38f, 0x202080) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r2, &(0x7f0000000340)="45e6e5a8238a69af1a8fc4f301e49aa193e1ea2e32793defeef64a5e27cc0da336cfeb2a1b4ef7d912afed34691a2435cf9beb87db1928e8806d38c62d14b98ac88b362c964fc3027950c1a2c1b6f9", &(0x7f00000003c0)=""/115}, 0x18) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000140)=0xe8) sendmsg$can_raw(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x1d, r4}, 0x10, &(0x7f0000000280)={&(0x7f0000000200)=@canfd={{0x4, 0x4, 0x3, 0x10000}, 0x2b, 0x2, 0x0, 0x0, "2096a5fb9891ca713a19626e8b01ae72f6c0cf762d80ba4d623d5d56a1b2d13ea6623c65006eed379e787f9e372dbbccf030fa575462b5a7533f823007c031ad"}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4040840) [ 879.863698] ? syscall_return_slowpath+0x5e0/0x5e0 [ 879.868651] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 879.873513] ? trace_hardirqs_on_caller+0x310/0x310 [ 879.878544] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 879.883577] ? prepare_exit_to_usermode+0x291/0x3b0 [ 879.888633] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 879.893497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 879.898703] RIP: 0033:0x4573d7 03:36:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) ioperm(0x1de, 0x7ff, 0x2) ioctl(r1, 0x1, &(0x7f0000000000)="fb6529bd118fab1162ba95f321af2603bcdd8ae1bda5b6bdbdd6ad687cfa631ba77b522e85376a1cf642e08c4c9a4bd6595757148e597158bdc46c40d406d95598f2ee8291b356d07a264063e5a0c9ac5b8c73efd62d98a1cf53533a69135e0213651b2a186120139517e407747733430646b42e68639f03edbbfa649264c511c18a40f0493b0f69e93d56ebc0b0467e5d0e60758ed9d3e12181dead5bedf4d72bd0881341dd1f2193d75c20aeabda05d668d5c0bfbb27ee3002464aae48dc3ffedbc4e0d70f0af93292ba5cc8") [ 879.901918] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 879.920833] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 879.928552] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 879.935828] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 879.943106] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 879.950391] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:36:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0xffffffa4, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 879.957844] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 03:36:47 executing program 1 (fault-call:2 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x2, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x4, 0x20000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000040)) close(r1) 03:36:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000070080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0xa0010000, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000007000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000020000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x200140) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x4, 0x7, 0x0, 0x3ff, 0x401, 0x7ff, 0x9, {0x0, @in={{0x2, 0x4e22}}, 0x200, 0x6, 0x9, 0x81, 0x1000}}, &(0x7f0000000200)=0xb0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYBLOB="80007f009cfaba8ce1be860a159602e2432f02c6b4866419769cfc3beff93b1e8f0dec2580aa00477310b9909048ceeecf80fd96eb99e8765d83d9dcf09d7755018d33cc003204a01511fa8628db1dc12463bb8c3ab1846d48e4851aa2a9621ee87d37fb5b648e1d26255a49971e4a066d02b37a6b9e1d24ef9f3f67976511f7c04103"], 0x87) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000300)={r2, 0x4, 0x3, 0x6bc}, 0x10) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) setsockopt$inet_group_source_req(r1, 0x0, 0x2c, &(0x7f0000000340)={0x9, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e23, @loopback}}}, 0x108) r4 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x4076, 0x10000) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000000040), 0x4) r5 = socket$vsock_stream(0x28, 0x1, 0x0) close(r5) connect$rds(r4, &(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10) 03:36:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x20000000, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 880.244990] FAULT_INJECTION: forcing a failure. [ 880.244990] name failslab, interval 1, probability 0, space 0, times 0 [ 880.303918] CPU: 1 PID: 19985 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 880.312448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 880.321810] Call Trace: [ 880.324420] dump_stack+0x244/0x39d [ 880.328086] ? dump_stack_print_info.cold.1+0x20/0x20 [ 880.333324] should_fail.cold.4+0xa/0x17 [ 880.337411] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 880.342532] ? lock_release+0xa10/0xa10 [ 880.346521] ? perf_trace_sched_process_exec+0x860/0x860 [ 880.351999] ? zap_class+0x640/0x640 [ 880.355743] ? find_held_lock+0x36/0x1c0 [ 880.359828] ? __lock_is_held+0xb5/0x140 [ 880.363976] ? fw_get_response_length+0x138/0x170 [ 880.368872] ? perf_trace_sched_process_exec+0x860/0x860 [ 880.368890] ? kernfs_activate+0x21a/0x2c0 [ 880.368920] __should_failslab+0x124/0x180 [ 880.368942] should_failslab+0x9/0x14 [ 880.378647] kmem_cache_alloc+0x2be/0x730 [ 880.378666] ? lock_downgrade+0x900/0x900 [ 880.378688] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 880.378708] __kernfs_new_node+0x127/0x8d0 03:36:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x1a0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 880.378729] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 880.409021] ? zap_class+0x640/0x640 [ 880.412769] ? __lock_is_held+0xb5/0x140 [ 880.416842] ? wait_for_completion+0x8a0/0x8a0 [ 880.421453] ? mutex_unlock+0xd/0x10 [ 880.425181] ? kernfs_activate+0x21a/0x2c0 [ 880.429439] ? kernfs_walk_and_get_ns+0x340/0x340 [ 880.434306] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 880.439855] ? kernfs_link_sibling+0x1d2/0x3b0 [ 880.444463] kernfs_new_node+0x95/0x120 [ 880.448482] __kernfs_create_file+0x5a/0x340 [ 880.452914] sysfs_add_file_mode_ns+0x222/0x530 [ 880.457614] internal_create_group+0x3df/0xd80 [ 880.457646] ? remove_files.isra.1+0x190/0x190 [ 880.457661] ? up_write+0x7b/0x220 [ 880.457679] ? down_write_nested+0x130/0x130 [ 880.457695] ? down_read+0x120/0x120 [ 880.457727] sysfs_create_group+0x1f/0x30 [ 880.466890] lo_ioctl+0x1307/0x1d60 [ 880.466920] ? lo_rw_aio+0x1ef0/0x1ef0 [ 880.466941] blkdev_ioctl+0x9ac/0x2010 [ 880.466962] ? blkpg_ioctl+0xc10/0xc10 [ 880.466982] ? lock_downgrade+0x900/0x900 03:36:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x2000, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 880.502172] ? check_preemption_disabled+0x48/0x280 [ 880.507213] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 880.512172] ? kasan_check_read+0x11/0x20 [ 880.516342] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 880.521638] ? rcu_softirq_qs+0x20/0x20 [ 880.525643] ? __fget+0x4d1/0x740 [ 880.529121] ? ksys_dup3+0x680/0x680 [ 880.532871] block_ioctl+0xee/0x130 [ 880.536517] ? blkdev_fallocate+0x400/0x400 [ 880.540860] do_vfs_ioctl+0x1de/0x1720 [ 880.544763] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 880.544786] ? ioctl_preallocate+0x300/0x300 [ 880.544804] ? __fget_light+0x2e9/0x430 [ 880.544822] ? fget_raw+0x20/0x20 [ 880.544841] ? rcu_read_lock_sched_held+0x14f/0x180 [ 880.544859] ? kmem_cache_free+0x24f/0x290 [ 880.544877] ? putname+0xf7/0x130 [ 880.554826] ? do_syscall_64+0x9a/0x820 [ 880.554843] ? do_syscall_64+0x9a/0x820 [ 880.554863] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 880.554884] ? security_file_ioctl+0x94/0xc0 [ 880.554906] ksys_ioctl+0xa9/0xd0 [ 880.554927] __x64_sys_ioctl+0x73/0xb0 [ 880.554947] do_syscall_64+0x1b9/0x820 03:36:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0xffffffffa0010000, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 880.603174] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 880.608558] ? syscall_return_slowpath+0x5e0/0x5e0 [ 880.613502] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 880.618360] ? trace_hardirqs_on_caller+0x310/0x310 [ 880.623396] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 880.628445] ? prepare_exit_to_usermode+0x291/0x3b0 [ 880.633488] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 880.638360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 880.643559] RIP: 0033:0x4573d7 [ 880.646766] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 880.665683] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 880.673403] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 880.680681] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 880.687958] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 880.695239] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:36:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0xa4ffffff, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 880.702523] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 880.752507] EXT4-fs: 3 callbacks suppressed [ 880.752519] EXT4-fs (sda1): re-mounted. Opts: 03:36:47 executing program 1 (fault-call:2 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r0) recvmsg$kcm(r2, &(0x7f0000000180)={&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/182, 0xb6}, {&(0x7f0000000200)=""/172, 0xac}], 0x2, &(0x7f00000002c0)=""/116, 0x74, 0x8001}, 0x10000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$vsock_stream(0x28, 0x1, 0x0) write$P9_RFLUSH(r2, &(0x7f0000000340)={0x7, 0x6d, 0x1}, 0x7) close(r3) 03:36:47 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000680", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000f5ffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x8001a0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000fffffff60000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 880.912049] EXT4-fs (sda1): re-mounted. Opts: 03:36:48 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x8001a0ffffffff, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 880.979396] FAULT_INJECTION: forcing a failure. [ 880.979396] name failslab, interval 1, probability 0, space 0, times 0 [ 881.032202] CPU: 1 PID: 20047 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 881.040730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.040738] Call Trace: [ 881.040765] dump_stack+0x244/0x39d [ 881.040792] ? dump_stack_print_info.cold.1+0x20/0x20 [ 881.056390] should_fail.cold.4+0xa/0x17 [ 881.065638] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 881.070771] ? lock_release+0xa10/0xa10 [ 881.074780] ? perf_trace_sched_process_exec+0x860/0x860 [ 881.080257] ? zap_class+0x640/0x640 [ 881.084002] ? find_held_lock+0x36/0x1c0 [ 881.088097] ? __lock_is_held+0xb5/0x140 [ 881.088139] ? perf_trace_sched_process_exec+0x860/0x860 [ 881.097648] ? kernfs_activate+0x21a/0x2c0 [ 881.097682] __should_failslab+0x124/0x180 [ 881.106151] should_failslab+0x9/0x14 [ 881.109974] kmem_cache_alloc+0x2be/0x730 [ 881.114152] ? lock_downgrade+0x900/0x900 [ 881.118321] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 881.123359] __kernfs_new_node+0x127/0x8d0 [ 881.127626] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 881.132402] ? zap_class+0x640/0x640 [ 881.136147] ? __lock_is_held+0xb5/0x140 [ 881.140226] ? wait_for_completion+0x8a0/0x8a0 [ 881.144840] ? mutex_unlock+0xd/0x10 [ 881.148569] ? kernfs_activate+0x21a/0x2c0 [ 881.152821] ? kernfs_walk_and_get_ns+0x340/0x340 [ 881.157684] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 881.163232] ? kernfs_link_sibling+0x1d2/0x3b0 [ 881.163258] kernfs_new_node+0x95/0x120 [ 881.163283] __kernfs_create_file+0x5a/0x340 [ 881.163306] sysfs_add_file_mode_ns+0x222/0x530 03:36:48 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x1f00000000000000, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:48 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x2000000000000000, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 881.171889] internal_create_group+0x3df/0xd80 [ 881.171919] ? remove_files.isra.1+0x190/0x190 [ 881.190217] ? up_write+0x7b/0x220 [ 881.193777] ? down_write_nested+0x130/0x130 [ 881.198204] ? down_read+0x120/0x120 [ 881.201955] sysfs_create_group+0x1f/0x30 [ 881.206134] lo_ioctl+0x1307/0x1d60 [ 881.209790] ? lo_rw_aio+0x1ef0/0x1ef0 [ 881.213697] blkdev_ioctl+0x9ac/0x2010 [ 881.217610] ? blkpg_ioctl+0xc10/0xc10 [ 881.221525] ? lock_downgrade+0x900/0x900 [ 881.225683] ? check_preemption_disabled+0x48/0x280 [ 881.230718] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 881.235664] ? kasan_check_read+0x11/0x20 [ 881.239832] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 881.239852] ? rcu_softirq_qs+0x20/0x20 [ 881.239881] ? __fget+0x4d1/0x740 [ 881.249138] ? ksys_dup3+0x680/0x680 [ 881.256300] block_ioctl+0xee/0x130 [ 881.259940] ? blkdev_fallocate+0x400/0x400 [ 881.264279] do_vfs_ioctl+0x1de/0x1720 [ 881.268188] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 881.273754] ? ioctl_preallocate+0x300/0x300 [ 881.278182] ? __fget_light+0x2e9/0x430 [ 881.282165] ? fget_raw+0x20/0x20 [ 881.285610] ? rcu_read_lock_sched_held+0x14f/0x180 [ 881.290622] ? kmem_cache_free+0x24f/0x290 [ 881.294849] ? putname+0xf7/0x130 [ 881.298295] ? do_syscall_64+0x9a/0x820 [ 881.302263] ? do_syscall_64+0x9a/0x820 [ 881.306247] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 881.310820] ? security_file_ioctl+0x94/0xc0 [ 881.315218] ksys_ioctl+0xa9/0xd0 [ 881.318666] __x64_sys_ioctl+0x73/0xb0 [ 881.322574] do_syscall_64+0x1b9/0x820 [ 881.326466] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 881.331818] ? syscall_return_slowpath+0x5e0/0x5e0 [ 881.336741] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 881.341575] ? trace_hardirqs_on_caller+0x310/0x310 [ 881.346579] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 881.351584] ? prepare_exit_to_usermode+0x291/0x3b0 [ 881.356610] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 881.361449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 881.366630] RIP: 0033:0x4573d7 [ 881.369816] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 881.388703] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 881.396414] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 881.403671] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 881.410927] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 881.418185] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 881.425441] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 03:36:48 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x1000000, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000006c80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 881.443155] EXT4-fs (sda1): re-mounted. Opts: [ 881.455249] EXT4-fs (sda1): re-mounted. Opts: 03:36:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000d52004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:48 executing program 1 (fault-call:2 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 881.694739] print_req_error: I/O error, dev loop4, sector 128 [ 881.717729] EXT4-fs (sda1): re-mounted. Opts: [ 881.726181] FAULT_INJECTION: forcing a failure. [ 881.726181] name failslab, interval 1, probability 0, space 0, times 0 [ 881.760274] CPU: 0 PID: 20094 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 881.768781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.768794] Call Trace: [ 881.780757] dump_stack+0x244/0x39d [ 881.784407] ? dump_stack_print_info.cold.1+0x20/0x20 [ 881.789620] should_fail.cold.4+0xa/0x17 [ 881.793716] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 881.798840] ? lock_release+0xa10/0xa10 [ 881.798857] ? perf_trace_sched_process_exec+0x860/0x860 [ 881.798883] ? zap_class+0x640/0x640 [ 881.798909] ? find_held_lock+0x36/0x1c0 [ 881.816085] ? __lock_is_held+0xb5/0x140 [ 881.820183] ? perf_trace_sched_process_exec+0x860/0x860 [ 881.825659] ? kernfs_activate+0x21a/0x2c0 [ 881.829925] __should_failslab+0x124/0x180 [ 881.834181] should_failslab+0x9/0x14 [ 881.837992] kmem_cache_alloc+0x2be/0x730 [ 881.842154] ? lock_downgrade+0x900/0x900 [ 881.846323] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 881.851356] __kernfs_new_node+0x127/0x8d0 [ 881.855609] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 881.860384] ? zap_class+0x640/0x640 [ 881.864128] ? __lock_is_held+0xb5/0x140 [ 881.868203] ? wait_for_completion+0x8a0/0x8a0 [ 881.872813] ? mutex_unlock+0xd/0x10 [ 881.876547] ? kernfs_activate+0x21a/0x2c0 [ 881.880806] ? kernfs_walk_and_get_ns+0x340/0x340 [ 881.885677] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 881.891229] ? kernfs_link_sibling+0x1d2/0x3b0 [ 881.895832] kernfs_new_node+0x95/0x120 [ 881.899834] __kernfs_create_file+0x5a/0x340 [ 881.904267] sysfs_add_file_mode_ns+0x222/0x530 [ 881.908968] internal_create_group+0x3df/0xd80 [ 881.913591] ? remove_files.isra.1+0x190/0x190 [ 881.918204] ? up_write+0x7b/0x220 [ 881.921760] ? down_write_nested+0x130/0x130 [ 881.926184] ? down_read+0x120/0x120 [ 881.929932] sysfs_create_group+0x1f/0x30 [ 881.934102] lo_ioctl+0x1307/0x1d60 [ 881.937763] ? lo_rw_aio+0x1ef0/0x1ef0 [ 881.941679] blkdev_ioctl+0x9ac/0x2010 [ 881.945586] ? blkpg_ioctl+0xc10/0xc10 [ 881.949492] ? lock_downgrade+0x900/0x900 [ 881.954163] ? check_preemption_disabled+0x48/0x280 [ 881.959203] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 881.964151] ? kasan_check_read+0x11/0x20 [ 881.968331] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 881.973634] ? rcu_softirq_qs+0x20/0x20 [ 881.977642] ? __fget+0x4d1/0x740 [ 881.981133] ? ksys_dup3+0x680/0x680 [ 881.984908] block_ioctl+0xee/0x130 [ 881.988551] ? blkdev_fallocate+0x400/0x400 [ 881.992891] do_vfs_ioctl+0x1de/0x1720 [ 881.996801] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 882.002376] ? ioctl_preallocate+0x300/0x300 [ 882.002393] ? __fget_light+0x2e9/0x430 [ 882.002410] ? fget_raw+0x20/0x20 [ 882.002427] ? rcu_read_lock_sched_held+0x14f/0x180 [ 882.002444] ? kmem_cache_free+0x24f/0x290 [ 882.002460] ? putname+0xf7/0x130 [ 882.010842] ? do_syscall_64+0x9a/0x820 [ 882.010859] ? do_syscall_64+0x9a/0x820 [ 882.010877] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 882.010899] ? security_file_ioctl+0x94/0xc0 [ 882.043938] ksys_ioctl+0xa9/0xd0 [ 882.047413] __x64_sys_ioctl+0x73/0xb0 [ 882.051321] do_syscall_64+0x1b9/0x820 [ 882.055223] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 882.060814] ? syscall_return_slowpath+0x5e0/0x5e0 [ 882.065759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 882.070611] ? trace_hardirqs_on_caller+0x310/0x310 [ 882.075658] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 882.075679] ? prepare_exit_to_usermode+0x291/0x3b0 [ 882.075702] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 882.075727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 882.075740] RIP: 0033:0x4573d7 [ 882.075762] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 882.117885] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 882.125594] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 882.132868] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 882.140138] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 882.147406] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 03:36:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x100000e, 0x10810, r1, 0x0) fcntl$addseals(r0, 0x409, 0x8) connect$pppoe(r2, &(0x7f0000000040)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'team0\x00'}}, 0x1e) r3 = socket$vsock_stream(0x28, 0x1, 0x0) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x200000, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000000c0)={0x0, 0x0}) fcntl$setownex(r1, 0xf, &(0x7f0000000080)={0x0, r5}) ioctl$VT_RELDISP(r4, 0x5605) close(r3) 03:36:48 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x1a0ffffffff, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000060000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000080080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:49 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000040)=ANY=[@ANYBLOB="060000001800000000b9a6c9713921ee2e200000050000000d31566fdfa521ae"]) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x400, 0x0) socketpair$unix(0x1, 0x200000000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) 03:36:49 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x1f00, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:49 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x2000, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 882.156352] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 882.194587] EXT4-fs (sda1): re-mounted. Opts: 03:36:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xdc8d) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) connect$can_bcm(r2, &(0x7f0000000180)={0x1d, r3}, 0x10) close(r1) 03:36:49 executing program 1 (fault-call:2 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000006004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 882.322691] EXT4-fs (sda1): re-mounted. Opts: 03:36:49 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0xffffffffa0010000, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000080)={0x0, 0x3d8d, 0xe2d, 0x0, 0x10, 0x5}) close(r1) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x20000, 0x0) [ 882.400660] EXT4-fs (sda1): re-mounted. Opts: [ 882.412280] FAULT_INJECTION: forcing a failure. [ 882.412280] name failslab, interval 1, probability 0, space 0, times 0 [ 882.466666] CPU: 0 PID: 20144 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 882.475194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.484551] Call Trace: [ 882.487162] dump_stack+0x244/0x39d [ 882.490824] ? dump_stack_print_info.cold.1+0x20/0x20 [ 882.496047] should_fail.cold.4+0xa/0x17 [ 882.500125] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 882.505246] ? lock_release+0xa10/0xa10 [ 882.509235] ? perf_trace_sched_process_exec+0x860/0x860 03:36:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000003f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x5, 0x7ff, 0x9}) [ 882.514709] ? zap_class+0x640/0x640 [ 882.518446] ? find_held_lock+0x36/0x1c0 [ 882.522572] ? __lock_is_held+0xb5/0x140 [ 882.526672] ? perf_trace_sched_process_exec+0x860/0x860 [ 882.532142] ? kernfs_activate+0x21a/0x2c0 [ 882.536405] __should_failslab+0x124/0x180 [ 882.540666] should_failslab+0x9/0x14 [ 882.544482] kmem_cache_alloc+0x2be/0x730 [ 882.548651] ? lock_downgrade+0x900/0x900 [ 882.552825] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 882.557867] __kernfs_new_node+0x127/0x8d0 [ 882.562116] ? kernfs_dop_revalidate+0x3c0/0x3c0 03:36:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000030000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x800, 0x0) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) close(r0) 03:36:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80, 0x0) getsockname$llc(r1, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000140)=0x10) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x9) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x100) setsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000080)={0x832b, 0x4, 0xffffffff, 0x2}, 0x6) [ 882.566885] ? zap_class+0x640/0x640 [ 882.570637] ? __lock_is_held+0xb5/0x140 [ 882.574716] ? wait_for_completion+0x8a0/0x8a0 [ 882.579330] ? mutex_unlock+0xd/0x10 [ 882.583063] ? kernfs_activate+0x21a/0x2c0 [ 882.587331] ? kernfs_walk_and_get_ns+0x340/0x340 [ 882.592197] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 882.597753] ? kernfs_link_sibling+0x1d2/0x3b0 [ 882.602358] kernfs_new_node+0x95/0x120 [ 882.606355] __kernfs_create_file+0x5a/0x340 [ 882.610789] sysfs_add_file_mode_ns+0x222/0x530 03:36:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000), &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x1, &(0x7f00000003c0)) mount(&(0x7f00000003c0)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)="18765468f7c38d", 0x100000, &(0x7f0000000400)) clone(0x70024000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000040), &(0x7f0000000180)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)="760001b076", 0x3080, &(0x7f0000000200)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x2000000081, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) bind$can_raw(r1, &(0x7f0000000180)={0x1d, r2}, 0x10) r3 = socket$vsock_stream(0x28, 0x1, 0x0) close(r3) [ 882.615488] internal_create_group+0x3df/0xd80 [ 882.620105] ? remove_files.isra.1+0x190/0x190 [ 882.624697] ? up_write+0x7b/0x220 [ 882.628250] ? down_write_nested+0x130/0x130 [ 882.632679] ? down_read+0x120/0x120 [ 882.636438] sysfs_create_group+0x1f/0x30 [ 882.640655] lo_ioctl+0x1307/0x1d60 [ 882.644305] ? lo_rw_aio+0x1ef0/0x1ef0 [ 882.648215] blkdev_ioctl+0x9ac/0x2010 [ 882.652139] ? blkpg_ioctl+0xc10/0xc10 [ 882.656044] ? lock_downgrade+0x900/0x900 [ 882.660205] ? check_preemption_disabled+0x48/0x280 [ 882.665245] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 882.670196] ? kasan_check_read+0x11/0x20 [ 882.674363] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 882.679670] ? rcu_softirq_qs+0x20/0x20 [ 882.680786] IPVS: ftp: loaded support on port[0] = 21 [ 882.683675] ? __fget+0x4d1/0x740 [ 882.683701] ? ksys_dup3+0x680/0x680 [ 882.683734] block_ioctl+0xee/0x130 [ 882.683751] ? blkdev_fallocate+0x400/0x400 [ 882.683768] do_vfs_ioctl+0x1de/0x1720 [ 882.683792] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 882.699760] ? ioctl_preallocate+0x300/0x300 [ 882.699780] ? __fget_light+0x2e9/0x430 [ 882.699797] ? fget_raw+0x20/0x20 [ 882.699819] ? rcu_read_lock_sched_held+0x14f/0x180 [ 882.699836] ? kmem_cache_free+0x24f/0x290 [ 882.699854] ? putname+0xf7/0x130 [ 882.708344] ? do_syscall_64+0x9a/0x820 [ 882.708362] ? do_syscall_64+0x9a/0x820 [ 882.708380] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 882.708402] ? security_file_ioctl+0x94/0xc0 [ 882.718341] ksys_ioctl+0xa9/0xd0 [ 882.718365] __x64_sys_ioctl+0x73/0xb0 [ 882.718385] do_syscall_64+0x1b9/0x820 [ 882.718405] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 882.725827] ? syscall_return_slowpath+0x5e0/0x5e0 [ 882.725844] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 882.725864] ? trace_hardirqs_on_caller+0x310/0x310 [ 882.725887] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 882.735123] ? prepare_exit_to_usermode+0x291/0x3b0 [ 882.735160] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 882.735185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 882.735198] RIP: 0033:0x4573d7 [ 882.735227] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 882.735237] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 882.735251] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 882.735259] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 882.735275] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 882.746662] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 882.746672] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 882.875285] EXT4-fs (sda1): re-mounted. Opts: 03:36:50 executing program 1 (fault-call:2 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:50 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0xffffffff00000000, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 883.040903] EXT4-fs (sda1): re-mounted. Opts: 03:36:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000001f00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000e00080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000fffffff40000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 883.231333] FAULT_INJECTION: forcing a failure. [ 883.231333] name failslab, interval 1, probability 0, space 0, times 0 [ 883.246816] IPVS: ftp: loaded support on port[0] = 21 [ 883.286791] CPU: 1 PID: 20200 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 883.295319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.304680] Call Trace: [ 883.304708] dump_stack+0x244/0x39d [ 883.304737] ? dump_stack_print_info.cold.1+0x20/0x20 [ 883.304763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 883.304792] should_fail.cold.4+0xa/0x17 [ 883.321707] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 883.321726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 883.321742] ? wake_up_klogd+0x11a/0x180 [ 883.321759] ? console_device+0xc0/0xc0 [ 883.330922] ? __down_trylock_console_sem+0x151/0x1f0 [ 883.330944] ? zap_class+0x640/0x640 [ 883.330959] ? vprintk_emit+0x293/0x990 [ 883.330984] ? find_held_lock+0x36/0x1c0 [ 883.340578] ? __lock_is_held+0xb5/0x140 [ 883.340686] ? mlx4_flow_steer_promisc_add+0x258/0x470 [ 883.340720] ? perf_trace_sched_process_exec+0x860/0x860 [ 883.349865] ? vprintk_default+0x28/0x30 [ 883.349890] __should_failslab+0x124/0x180 [ 883.349912] should_failslab+0x9/0x14 [ 883.349933] kmem_cache_alloc_trace+0x2d7/0x750 [ 883.357635] kobject_uevent_env+0x2f3/0x101e [ 883.357666] kobject_uevent+0x1f/0x24 [ 883.357688] lo_ioctl+0x1385/0x1d60 [ 883.365804] ? lo_rw_aio+0x1ef0/0x1ef0 [ 883.365826] blkdev_ioctl+0x9ac/0x2010 [ 883.365849] ? blkpg_ioctl+0xc10/0xc10 [ 883.365865] ? lock_downgrade+0x900/0x900 [ 883.365880] ? check_preemption_disabled+0x48/0x280 [ 883.365903] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 883.376620] ? kasan_check_read+0x11/0x20 03:36:50 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x1a0ffffffff, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 883.376643] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 883.376663] ? rcu_softirq_qs+0x20/0x20 [ 883.376694] ? __fget+0x4d1/0x740 [ 883.384984] ? ksys_dup3+0x680/0x680 [ 883.385019] block_ioctl+0xee/0x130 [ 883.385037] ? blkdev_fallocate+0x400/0x400 [ 883.385055] do_vfs_ioctl+0x1de/0x1720 [ 883.385075] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 883.385094] ? ioctl_preallocate+0x300/0x300 [ 883.393552] ? __fget_light+0x2e9/0x430 [ 883.393572] ? fget_raw+0x20/0x20 [ 883.393592] ? rcu_read_lock_sched_held+0x14f/0x180 [ 883.393610] ? kmem_cache_free+0x24f/0x290 [ 883.393639] ? putname+0xf7/0x130 [ 883.393662] ? do_syscall_64+0x9a/0x820 [ 883.401861] ? do_syscall_64+0x9a/0x820 [ 883.401881] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 883.401903] ? security_file_ioctl+0x94/0xc0 [ 883.401925] ksys_ioctl+0xa9/0xd0 [ 883.401945] __x64_sys_ioctl+0x73/0xb0 [ 883.409458] do_syscall_64+0x1b9/0x820 [ 883.409477] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 883.409497] ? syscall_return_slowpath+0x5e0/0x5e0 [ 883.409513] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 883.409534] ? trace_hardirqs_on_caller+0x310/0x310 [ 883.417307] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 883.417329] ? prepare_exit_to_usermode+0x291/0x3b0 [ 883.417353] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 883.417379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 883.426529] RIP: 0033:0x4573d7 [ 883.426547] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 883.426556] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 883.426572] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 883.426582] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 883.426598] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 883.435683] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 883.435693] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 03:36:50 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0xa0018000, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000600080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000feffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000ffffff8c0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:50 executing program 1 (fault-call:2 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) [ 883.994525] FAULT_INJECTION: forcing a failure. [ 883.994525] name failslab, interval 1, probability 0, space 0, times 0 [ 884.023827] CPU: 1 PID: 20251 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 884.032336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 884.032344] Call Trace: [ 884.032370] dump_stack+0x244/0x39d [ 884.032409] ? dump_stack_print_info.cold.1+0x20/0x20 [ 884.032435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 884.059201] should_fail.cold.4+0xa/0x17 [ 884.063296] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 884.068417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 884.073971] ? wake_up_klogd+0x11a/0x180 [ 884.078050] ? console_device+0xc0/0xc0 [ 884.082049] ? __down_trylock_console_sem+0x151/0x1f0 [ 884.087257] ? zap_class+0x640/0x640 [ 884.087273] ? vprintk_emit+0x293/0x990 [ 884.087296] ? find_held_lock+0x36/0x1c0 [ 884.094994] ? __lock_is_held+0xb5/0x140 [ 884.095028] ? perf_trace_sched_process_exec+0x860/0x860 [ 884.103148] ? vprintk_default+0x28/0x30 [ 884.103172] __should_failslab+0x124/0x180 [ 884.103194] should_failslab+0x9/0x14 [ 884.103215] kmem_cache_alloc_trace+0x2d7/0x750 [ 884.112732] kobject_uevent_env+0x2f3/0x101e [ 884.112763] kobject_uevent+0x1f/0x24 [ 884.112784] lo_ioctl+0x1385/0x1d60 [ 884.112810] ? lo_rw_aio+0x1ef0/0x1ef0 [ 884.120831] blkdev_ioctl+0x9ac/0x2010 [ 884.120854] ? blkpg_ioctl+0xc10/0xc10 [ 884.120873] ? lock_downgrade+0x900/0x900 [ 884.129939] ? check_preemption_disabled+0x48/0x280 [ 884.129965] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 884.129986] ? kasan_check_read+0x11/0x20 [ 884.137403] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 884.137423] ? rcu_softirq_qs+0x20/0x20 [ 884.137453] ? __fget+0x4d1/0x740 [ 884.145209] ? ksys_dup3+0x680/0x680 [ 884.145243] block_ioctl+0xee/0x130 [ 884.145260] ? blkdev_fallocate+0x400/0x400 [ 884.145280] do_vfs_ioctl+0x1de/0x1720 [ 884.153309] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 884.153331] ? ioctl_preallocate+0x300/0x300 [ 884.153349] ? __fget_light+0x2e9/0x430 [ 884.153366] ? fget_raw+0x20/0x20 [ 884.153386] ? rcu_read_lock_sched_held+0x14f/0x180 [ 884.163321] ? kmem_cache_free+0x24f/0x290 [ 884.163340] ? putname+0xf7/0x130 [ 884.163360] ? do_syscall_64+0x9a/0x820 [ 884.163376] ? do_syscall_64+0x9a/0x820 [ 884.163396] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 884.172812] ? security_file_ioctl+0x94/0xc0 [ 884.172835] ksys_ioctl+0xa9/0xd0 [ 884.172856] __x64_sys_ioctl+0x73/0xb0 [ 884.172882] do_syscall_64+0x1b9/0x820 [ 884.180297] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 884.180318] ? syscall_return_slowpath+0x5e0/0x5e0 [ 884.180338] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 884.187678] ? trace_hardirqs_on_caller+0x310/0x310 [ 884.187697] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 884.187717] ? prepare_exit_to_usermode+0x291/0x3b0 [ 884.195922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 884.195953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 884.205890] RIP: 0033:0x4573d7 [ 884.205908] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 884.205917] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 884.205933] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 884.205942] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 884.205951] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 884.205966] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 884.213391] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 03:36:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) signalfd(r0, &(0x7f0000000000)={0x100000000}, 0x8) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200400, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x40) getsockopt$inet6_udp_int(r1, 0x11, 0x6f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000140)={0x0, 0x400, 0x2}) 03:36:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0xa4ffffff, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000500000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fcfdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:53 executing program 1 (fault-call:2 fault-nth:19): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000030080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x8001a0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 886.255995] FAULT_INJECTION: forcing a failure. [ 886.255995] name failslab, interval 1, probability 0, space 0, times 0 [ 886.278257] EXT4-fs: 7 callbacks suppressed [ 886.278270] EXT4-fs (sda1): re-mounted. Opts: [ 886.284084] CPU: 1 PID: 20304 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 886.295722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 886.295729] Call Trace: [ 886.295753] dump_stack+0x244/0x39d [ 886.295777] ? dump_stack_print_info.cold.1+0x20/0x20 [ 886.295800] ? is_bpf_text_address+0xd3/0x170 [ 886.295823] should_fail.cold.4+0xa/0x17 [ 886.295847] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 886.295879] ? zap_class+0x640/0x640 [ 886.333895] ? save_stack+0x43/0xd0 [ 886.337542] ? kasan_kmalloc+0xc7/0xe0 [ 886.341422] ? kmem_cache_alloc_trace+0x152/0x750 [ 886.346250] ? kobject_uevent_env+0x2f3/0x101e [ 886.350818] ? kobject_uevent+0x1f/0x24 [ 886.354779] ? lo_ioctl+0x1385/0x1d60 [ 886.358573] ? find_held_lock+0x36/0x1c0 [ 886.362627] ? __lock_is_held+0xb5/0x140 [ 886.366724] ? xfs_da3_node_toosmall+0xb88/0xef0 [ 886.371502] ? perf_trace_sched_process_exec+0x860/0x860 [ 886.376963] __should_failslab+0x124/0x180 [ 886.381188] should_failslab+0x9/0x14 [ 886.384980] __kmalloc+0x2e0/0x760 [ 886.388521] ? kobject_uevent_env+0x2f3/0x101e [ 886.393118] ? rcu_read_lock_sched_held+0x14f/0x180 [ 886.398151] ? kobject_get_path+0xc2/0x1b0 [ 886.402385] ? kmem_cache_alloc_trace+0x353/0x750 [ 886.407236] kobject_get_path+0xc2/0x1b0 [ 886.411290] kobject_uevent_env+0x314/0x101e [ 886.415693] kobject_uevent+0x1f/0x24 [ 886.419495] lo_ioctl+0x1385/0x1d60 [ 886.423138] ? lo_rw_aio+0x1ef0/0x1ef0 [ 886.427031] blkdev_ioctl+0x9ac/0x2010 [ 886.430926] ? blkpg_ioctl+0xc10/0xc10 [ 886.434821] ? lock_downgrade+0x900/0x900 [ 886.438972] ? check_preemption_disabled+0x48/0x280 [ 886.444001] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 886.448919] ? kasan_check_read+0x11/0x20 [ 886.453057] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 886.458325] ? rcu_softirq_qs+0x20/0x20 [ 886.462296] ? __fget+0x4d1/0x740 [ 886.465789] ? ksys_dup3+0x680/0x680 [ 886.469527] block_ioctl+0xee/0x130 [ 886.473148] ? blkdev_fallocate+0x400/0x400 [ 886.477461] do_vfs_ioctl+0x1de/0x1720 [ 886.481377] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 886.486928] ? ioctl_preallocate+0x300/0x300 [ 886.491328] ? __fget_light+0x2e9/0x430 [ 886.495291] ? fget_raw+0x20/0x20 [ 886.498752] ? rcu_read_lock_sched_held+0x14f/0x180 [ 886.503760] ? kmem_cache_free+0x24f/0x290 [ 886.507983] ? putname+0xf7/0x130 [ 886.511424] ? do_syscall_64+0x9a/0x820 [ 886.515384] ? do_syscall_64+0x9a/0x820 [ 886.519350] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 886.523921] ? security_file_ioctl+0x94/0xc0 [ 886.528322] ksys_ioctl+0xa9/0xd0 [ 886.531765] __x64_sys_ioctl+0x73/0xb0 [ 886.535643] do_syscall_64+0x1b9/0x820 [ 886.539546] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 886.544928] ? syscall_return_slowpath+0x5e0/0x5e0 [ 886.549859] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 886.554705] ? trace_hardirqs_on_caller+0x310/0x310 [ 886.559709] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 886.564713] ? prepare_exit_to_usermode+0x291/0x3b0 [ 886.569736] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 886.574571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 886.579769] RIP: 0033:0x4573d7 [ 886.582953] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 886.601859] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 886.609554] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 886.616809] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 886.624071] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 886.631375] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 886.638631] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 886.649823] EXT4-fs (sda1): re-mounted. Opts: [ 886.696443] EXT4-fs (sda1): re-mounted. Opts: 03:36:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000002000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:53 executing program 1 (fault-call:2 fault-nth:20): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fdfdffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00006c0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:53 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x20000000, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:54 executing program 0: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000000c0)={0x1fe, 0x2, 0x0, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) memfd_create(&(0x7f0000000000)='%.*%proc\x00', 0x7) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) 03:36:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x100000000000000, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 886.956042] print_req_error: I/O error, dev loop4, sector 128 [ 886.995585] FAULT_INJECTION: forcing a failure. [ 886.995585] name failslab, interval 1, probability 0, space 0, times 0 03:36:54 executing program 0: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000040)=0x10, 0x80000) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000080)=0xa5cf05c, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) [ 887.043394] CPU: 1 PID: 20341 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 887.051927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.061284] Call Trace: [ 887.063905] dump_stack+0x244/0x39d [ 887.067560] ? dump_stack_print_info.cold.1+0x20/0x20 [ 887.072790] should_fail.cold.4+0xa/0x17 [ 887.076876] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 887.082004] ? __save_stack_trace+0x8d/0xf0 [ 887.086360] ? zap_class+0x640/0x640 [ 887.090088] ? save_stack+0xa9/0xd0 03:36:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x2000000000000000, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 887.093739] ? save_stack+0x43/0xd0 [ 887.097389] ? find_held_lock+0x36/0x1c0 [ 887.101469] ? __lock_is_held+0xb5/0x140 [ 887.105557] ? zap_class+0x640/0x640 [ 887.109284] ? perf_trace_sched_process_exec+0x860/0x860 [ 887.114756] ? check_preemption_disabled+0x48/0x280 [ 887.119831] __should_failslab+0x124/0x180 [ 887.124085] should_failslab+0x9/0x14 [ 887.127910] kmem_cache_alloc_node_trace+0x270/0x740 [ 887.133054] __kmalloc_node_track_caller+0x3c/0x70 [ 887.138011] __kmalloc_reserve.isra.40+0x41/0xe0 [ 887.142788] __alloc_skb+0x150/0x770 [ 887.146527] ? netdev_alloc_frag+0x1f0/0x1f0 [ 887.150954] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 887.155902] ? kasan_check_read+0x11/0x20 [ 887.160070] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 887.165363] ? rcu_softirq_qs+0x20/0x20 [ 887.169423] ? netlink_has_listeners+0x2cb/0x4a0 [ 887.174220] ? netlink_tap_init_net+0x3d0/0x3d0 [ 887.174242] alloc_uevent_skb+0x84/0x1da [ 887.174263] kobject_uevent_env+0xa52/0x101e [ 887.174292] kobject_uevent+0x1f/0x24 03:36:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x8001a0ffffffff, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 887.191208] lo_ioctl+0x1385/0x1d60 [ 887.194855] ? lo_rw_aio+0x1ef0/0x1ef0 [ 887.198752] blkdev_ioctl+0x9ac/0x2010 [ 887.202667] ? blkpg_ioctl+0xc10/0xc10 [ 887.206564] ? lock_downgrade+0x900/0x900 [ 887.210732] ? check_preemption_disabled+0x48/0x280 [ 887.215772] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 887.220726] ? kasan_check_read+0x11/0x20 [ 887.224893] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 887.230231] ? rcu_softirq_qs+0x20/0x20 [ 887.234245] ? __fget+0x4d1/0x740 [ 887.237719] ? ksys_dup3+0x680/0x680 03:36:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$vsock_stream(0x28, 0x1, 0x0) close(r0) 03:36:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x1f000000, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 887.241476] block_ioctl+0xee/0x130 [ 887.245115] ? blkdev_fallocate+0x400/0x400 [ 887.249490] do_vfs_ioctl+0x1de/0x1720 [ 887.253393] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 887.258951] ? ioctl_preallocate+0x300/0x300 [ 887.263373] ? __fget_light+0x2e9/0x430 [ 887.267386] ? fget_raw+0x20/0x20 [ 887.270870] ? rcu_read_lock_sched_held+0x14f/0x180 [ 887.275898] ? kmem_cache_free+0x24f/0x290 [ 887.280155] ? putname+0xf7/0x130 [ 887.283643] ? do_syscall_64+0x9a/0x820 [ 887.287644] ? do_syscall_64+0x9a/0x820 [ 887.291649] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 887.296257] ? security_file_ioctl+0x94/0xc0 [ 887.300688] ksys_ioctl+0xa9/0xd0 [ 887.304164] __x64_sys_ioctl+0x73/0xb0 [ 887.308080] do_syscall_64+0x1b9/0x820 [ 887.312021] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 887.317400] ? syscall_return_slowpath+0x5e0/0x5e0 [ 887.322364] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 887.327239] ? trace_hardirqs_on_caller+0x310/0x310 [ 887.332288] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 887.337329] ? prepare_exit_to_usermode+0x291/0x3b0 [ 887.342375] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 887.347241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 887.352465] RIP: 0033:0x4573d7 [ 887.355671] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 887.374584] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 887.382313] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 887.389589] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 887.396869] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 887.404123] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 887.411384] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 887.421100] print_req_error: I/O error, dev loop4, sector 128 [ 887.436447] EXT4-fs (sda1): re-mounted. Opts: [ 887.458701] EXT4-fs (sda1): re-mounted. Opts: 03:36:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000230000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) [ 887.552725] EXT4-fs (sda1): re-mounted. Opts: 03:36:54 executing program 1 (fault-call:2 fault-nth:21): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x8000) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000040)={0x0, 0xab8}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast2}, 0xef2}}}, 0x84) r3 = socket$vsock_stream(0x28, 0x1, 0x0) close(r3) 03:36:54 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000e0ff80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x1a0, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000500000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000f4ffffff0000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0xffffffa4, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x4001ff) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) [ 887.782857] FAULT_INJECTION: forcing a failure. [ 887.782857] name failslab, interval 1, probability 0, space 0, times 0 [ 887.813789] CPU: 1 PID: 20403 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 887.822312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:36:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0xffffffffa0018000, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 887.831676] Call Trace: [ 887.834297] dump_stack+0x244/0x39d [ 887.837994] ? dump_stack_print_info.cold.1+0x20/0x20 [ 887.843218] ? lock_downgrade+0x900/0x900 [ 887.847393] should_fail.cold.4+0xa/0x17 [ 887.851481] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 887.856605] ? rcu_softirq_qs+0x20/0x20 [ 887.860623] ? unwind_dump+0x190/0x190 [ 887.864535] ? is_bpf_text_address+0xd3/0x170 [ 887.869044] ? zap_class+0x640/0x640 [ 887.872776] ? __kernel_text_address+0xd/0x40 [ 887.877281] ? unwind_get_return_address+0x61/0xa0 03:36:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x301000, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000040)={0x1, 0x5}) close(r1) [ 887.882233] ? find_held_lock+0x36/0x1c0 [ 887.886314] ? __lock_is_held+0xb5/0x140 [ 887.890414] ? kobject_uevent+0x1f/0x24 [ 887.894400] ? perf_trace_sched_process_exec+0x860/0x860 [ 887.899859] ? do_vfs_ioctl+0x1de/0x1720 [ 887.903933] ? ksys_ioctl+0xa9/0xd0 [ 887.907571] ? __x64_sys_ioctl+0x73/0xb0 [ 887.911667] ? do_syscall_64+0x1b9/0x820 [ 887.915755] __should_failslab+0x124/0x180 [ 887.920012] should_failslab+0x9/0x14 [ 887.923830] kmem_cache_alloc+0x2be/0x730 [ 887.928013] skb_clone+0x1bb/0x500 03:36:55 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x1f00000000000000, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 887.931571] ? skb_split+0x11e0/0x11e0 [ 887.935486] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 887.940518] ? netlink_trim+0x1b4/0x380 [ 887.944537] ? netlink_skb_destructor+0x210/0x210 [ 887.949409] netlink_broadcast_filtered+0x110f/0x1680 [ 887.954800] ? __netlink_sendskb+0xd0/0xd0 [ 887.959066] ? kasan_check_read+0x11/0x20 [ 887.963233] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 887.968531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 887.974080] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 03:36:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='coredump_filter\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000001c0)={0x1, [0x8]}, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x44000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={0x0, 0x3, 0x30}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r3, 0x5, 0x81}, 0xc) r4 = socket$vsock_stream(0x28, 0x1, 0x0) close(r4) ioctl$sock_inet_SIOCGIFNETMASK(r4, 0x891b, &(0x7f0000000040)={'gre0\x00', {0x2, 0x4e22}}) [ 887.979555] ? refcount_add_not_zero_checked+0x330/0x330 [ 887.985048] ? netlink_has_listeners+0x2cb/0x4a0 [ 887.989830] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 887.994874] netlink_broadcast+0x3a/0x50 [ 887.998956] kobject_uevent_env+0xa83/0x101e [ 888.003403] kobject_uevent+0x1f/0x24 [ 888.007220] lo_ioctl+0x1385/0x1d60 [ 888.010871] ? lo_rw_aio+0x1ef0/0x1ef0 [ 888.014773] blkdev_ioctl+0x9ac/0x2010 [ 888.018683] ? blkpg_ioctl+0xc10/0xc10 [ 888.022585] ? lock_downgrade+0x900/0x900 [ 888.026743] ? check_preemption_disabled+0x48/0x280 [ 888.031785] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 888.036737] ? kasan_check_read+0x11/0x20 [ 888.040898] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 888.046188] ? rcu_softirq_qs+0x20/0x20 [ 888.050198] ? __fget+0x4d1/0x740 [ 888.053690] ? ksys_dup3+0x680/0x680 [ 888.057432] block_ioctl+0xee/0x130 [ 888.061607] ? blkdev_fallocate+0x400/0x400 [ 888.065963] do_vfs_ioctl+0x1de/0x1720 [ 888.069870] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 888.075426] ? ioctl_preallocate+0x300/0x300 [ 888.079867] ? __fget_light+0x2e9/0x430 [ 888.083860] ? fget_raw+0x20/0x20 [ 888.087346] ? rcu_read_lock_sched_held+0x14f/0x180 [ 888.092402] ? kmem_cache_free+0x24f/0x290 [ 888.096661] ? putname+0xf7/0x130 [ 888.100135] ? do_syscall_64+0x9a/0x820 [ 888.104133] ? do_syscall_64+0x9a/0x820 [ 888.108172] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 888.112773] ? security_file_ioctl+0x94/0xc0 [ 888.112796] ksys_ioctl+0xa9/0xd0 [ 888.112819] __x64_sys_ioctl+0x73/0xb0 [ 888.112839] do_syscall_64+0x1b9/0x820 [ 888.112855] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 888.112874] ? syscall_return_slowpath+0x5e0/0x5e0 [ 888.112896] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.120770] ? trace_hardirqs_on_caller+0x310/0x310 [ 888.120790] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 888.120810] ? prepare_exit_to_usermode+0x291/0x3b0 [ 888.120839] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.133966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 888.133981] RIP: 0033:0x4573d7 [ 888.133998] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 888.134008] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 888.134023] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 888.134033] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 888.134043] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 888.134052] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 888.134061] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 888.160760] EXT4-fs (sda1): re-mounted. Opts: [ 888.224028] EXT4-fs (sda1): re-mounted. Opts: 03:36:55 executing program 1 (fault-call:2 fault-nth:22): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:55 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0xa4ffffff00000000, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 888.294496] EXT4-fs (sda1): re-mounted. Opts: 03:36:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000000)='./file0\x00', 0x103000, 0x100) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000040)={0x1, 0xfffffffffffffffb, 0x1, 'queue1\x00', 0x5}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) 03:36:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00001020000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000004000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:55 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0xa0010000, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:55 executing program 0: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x1000, 0x121001) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x80000400200) r2 = dup(r0) getsockopt$inet6_buf(r2, 0x29, 0x0, &(0x7f0000000000)=""/210, &(0x7f0000000100)=0xd2) setsockopt$inet6_dccp_buf(r2, 0x21, 0xf, &(0x7f0000000140)="c4983bf83e552b3dc6f611b4b6b32119d0eb0a4d0b20c4c278b729da8288cd2ecab335c9948173af83f4e1df28afe8d6f648ba849c01646571458fd8416ada8a1004", 0x42) r3 = socket$vsock_stream(0x28, 0x1, 0x0) close(r3) 03:36:55 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x1000000, @local}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 888.502731] FAULT_INJECTION: forcing a failure. [ 888.502731] name failslab, interval 1, probability 0, space 0, times 0 [ 888.529197] CPU: 1 PID: 20448 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 888.537712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.547074] Call Trace: [ 888.549688] dump_stack+0x244/0x39d [ 888.553374] ? dump_stack_print_info.cold.1+0x20/0x20 [ 888.558596] should_fail.cold.4+0xa/0x17 [ 888.562697] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 888.567843] ? __save_stack_trace+0x8d/0xf0 [ 888.572193] ? zap_class+0x640/0x640 [ 888.575926] ? save_stack+0xa9/0xd0 [ 888.579567] ? save_stack+0x43/0xd0 [ 888.583220] ? find_held_lock+0x36/0x1c0 [ 888.587307] ? __lock_is_held+0xb5/0x140 [ 888.591388] ? find_lock_entry+0x338/0x8e0 [ 888.595653] ? zap_class+0x640/0x640 03:36:55 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000300)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f0000000340)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000380)=""/249) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7f, 0x202000) utimensat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x100) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x400}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000000c0)={r4, 0x8000, 0x3}, 0xffffff79) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000200)={r4, @in6={{0xa, 0x4e24, 0x86, @remote, 0x4fc7}}, 0x8001, 0x5, 0x5, 0x7, 0x8}, &(0x7f0000000140)=0x98) 03:36:55 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xffffffa4]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 888.599381] ? perf_trace_sched_process_exec+0x860/0x860 [ 888.604852] ? check_preemption_disabled+0x48/0x280 [ 888.609892] __should_failslab+0x124/0x180 [ 888.614154] should_failslab+0x9/0x14 [ 888.617972] kmem_cache_alloc_node_trace+0x270/0x740 [ 888.623097] __kmalloc_node_track_caller+0x3c/0x70 [ 888.628081] __kmalloc_reserve.isra.40+0x41/0xe0 [ 888.628105] __alloc_skb+0x150/0x770 [ 888.628136] ? netdev_alloc_frag+0x1f0/0x1f0 [ 888.640996] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 888.645935] ? kasan_check_read+0x11/0x20 03:36:55 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000040)={0x45, 0x459, 0x8, 0x6}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) [ 888.645956] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 888.645977] ? rcu_softirq_qs+0x20/0x20 [ 888.646007] ? netlink_has_listeners+0x2cb/0x4a0 [ 888.664158] ? netlink_tap_init_net+0x3d0/0x3d0 [ 888.668844] alloc_uevent_skb+0x84/0x1da [ 888.672921] kobject_uevent_env+0xa52/0x101e [ 888.677354] kobject_uevent+0x1f/0x24 [ 888.681176] lo_ioctl+0x1385/0x1d60 [ 888.684833] ? lo_rw_aio+0x1ef0/0x1ef0 [ 888.688743] blkdev_ioctl+0x9ac/0x2010 [ 888.692661] ? blkpg_ioctl+0xc10/0xc10 [ 888.696565] ? lock_downgrade+0x900/0x900 [ 888.700724] ? check_preemption_disabled+0x48/0x280 [ 888.705767] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 888.710711] ? kasan_check_read+0x11/0x20 [ 888.714883] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 888.720179] ? rcu_softirq_qs+0x20/0x20 [ 888.724181] ? __fget+0x4d1/0x740 [ 888.727661] ? ksys_dup3+0x680/0x680 [ 888.731405] block_ioctl+0xee/0x130 [ 888.735040] ? blkdev_fallocate+0x400/0x400 [ 888.739382] do_vfs_ioctl+0x1de/0x1720 [ 888.743289] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 888.748848] ? ioctl_preallocate+0x300/0x300 [ 888.753283] ? __fget_light+0x2e9/0x430 [ 888.757273] ? fget_raw+0x20/0x20 [ 888.760743] ? rcu_read_lock_sched_held+0x14f/0x180 [ 888.765778] ? kmem_cache_free+0x24f/0x290 [ 888.770018] ? putname+0xf7/0x130 [ 888.773464] ? do_syscall_64+0x9a/0x820 [ 888.777427] ? do_syscall_64+0x9a/0x820 [ 888.781434] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 888.786009] ? security_file_ioctl+0x94/0xc0 [ 888.790407] ksys_ioctl+0xa9/0xd0 [ 888.793857] __x64_sys_ioctl+0x73/0xb0 [ 888.797736] do_syscall_64+0x1b9/0x820 [ 888.801614] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 888.806981] ? syscall_return_slowpath+0x5e0/0x5e0 [ 888.811932] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.816792] ? trace_hardirqs_on_caller+0x310/0x310 [ 888.821800] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 888.826807] ? prepare_exit_to_usermode+0x291/0x3b0 [ 888.831830] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.836683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 888.841862] RIP: 0033:0x4573d7 [ 888.845051] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 888.863936] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 888.871637] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 888.878894] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 888.886148] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 888.893404] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 888.900663] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 [ 888.914020] EXT4-fs (sda1): re-mounted. Opts: 03:36:56 executing program 1 (fault-call:2 fault-nth:23): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) accept4$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x80800) 03:36:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="00004c0080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x1f00000000000000]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000fffffffb00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000fffffe000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:56 executing program 0: socketpair$unix(0x1, 0x80000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000080)={0x49, 0x29, 0x2, {0x100, [{{0xa637a0b31cc53a65, 0x4, 0x5}, 0xfffffffffffffff8, 0xfffffffffffffffa, 0x7, './file0'}, {{0x10, 0x0, 0x5}, 0x7fffffff, 0x4, 0x7, './file0'}]}}, 0x49) 03:36:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x1a0ffffffff]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 889.102406] FAULT_INJECTION: forcing a failure. [ 889.102406] name failslab, interval 1, probability 0, space 0, times 0 [ 889.148056] CPU: 0 PID: 20484 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 889.156581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.165953] Call Trace: [ 889.168566] dump_stack+0x244/0x39d [ 889.172216] ? dump_stack_print_info.cold.1+0x20/0x20 [ 889.177427] ? lock_downgrade+0x900/0x900 [ 889.181582] should_fail.cold.4+0xa/0x17 [ 889.185650] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 889.190743] ? rcu_softirq_qs+0x20/0x20 03:36:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x8001a0ffffffff]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 889.194715] ? unwind_dump+0x190/0x190 [ 889.198653] ? is_bpf_text_address+0xd3/0x170 [ 889.203160] ? zap_class+0x640/0x640 [ 889.206912] ? __kernel_text_address+0xd/0x40 [ 889.211420] ? unwind_get_return_address+0x61/0xa0 [ 889.216375] ? find_held_lock+0x36/0x1c0 [ 889.220453] ? __lock_is_held+0xb5/0x140 [ 889.224529] ? blkfront_delay_work+0x178/0x870 [ 889.229138] ? kobject_uevent+0x1f/0x24 [ 889.233141] ? perf_trace_sched_process_exec+0x860/0x860 [ 889.238612] ? do_vfs_ioctl+0x1de/0x1720 [ 889.242696] ? ksys_ioctl+0xa9/0xd0 03:36:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xa0018000]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 889.246332] ? __x64_sys_ioctl+0x73/0xb0 [ 889.250437] ? do_syscall_64+0x1b9/0x820 [ 889.254530] __should_failslab+0x124/0x180 [ 889.258868] should_failslab+0x9/0x14 [ 889.262683] kmem_cache_alloc+0x2be/0x730 [ 889.266867] skb_clone+0x1bb/0x500 [ 889.270441] ? skb_split+0x11e0/0x11e0 [ 889.274359] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 889.279385] ? netlink_trim+0x1b4/0x380 [ 889.283415] ? netlink_skb_destructor+0x210/0x210 [ 889.288280] netlink_broadcast_filtered+0x110f/0x1680 [ 889.293499] ? __netlink_sendskb+0xd0/0xd0 03:36:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x1f00]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 889.297758] ? kasan_check_read+0x11/0x20 [ 889.301924] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 889.307223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.312799] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 889.318274] ? refcount_add_not_zero_checked+0x330/0x330 [ 889.323744] ? netlink_has_listeners+0x2cb/0x4a0 [ 889.328510] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 889.333548] netlink_broadcast+0x3a/0x50 [ 889.337623] kobject_uevent_env+0xa83/0x101e [ 889.342066] kobject_uevent+0x1f/0x24 [ 889.345886] lo_ioctl+0x1385/0x1d60 [ 889.349538] ? lo_rw_aio+0x1ef0/0x1ef0 [ 889.353450] blkdev_ioctl+0x9ac/0x2010 [ 889.357359] ? blkpg_ioctl+0xc10/0xc10 [ 889.361256] ? lock_downgrade+0x900/0x900 [ 889.365422] ? check_preemption_disabled+0x48/0x280 [ 889.370457] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 889.375409] ? kasan_check_read+0x11/0x20 [ 889.379592] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 889.384899] ? rcu_softirq_qs+0x20/0x20 [ 889.388903] ? __fget+0x4d1/0x740 [ 889.392406] ? ksys_dup3+0x680/0x680 03:36:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xffffffffa0010000]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 889.396149] block_ioctl+0xee/0x130 [ 889.399797] ? blkdev_fallocate+0x400/0x400 [ 889.404134] do_vfs_ioctl+0x1de/0x1720 [ 889.408034] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 889.413605] ? ioctl_preallocate+0x300/0x300 [ 889.418032] ? __fget_light+0x2e9/0x430 [ 889.422024] ? fget_raw+0x20/0x20 [ 889.425497] ? rcu_read_lock_sched_held+0x14f/0x180 [ 889.430532] ? kmem_cache_free+0x24f/0x290 [ 889.434785] ? putname+0xf7/0x130 [ 889.438258] ? do_syscall_64+0x9a/0x820 [ 889.442251] ? do_syscall_64+0x9a/0x820 [ 889.446239] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 889.450842] ? security_file_ioctl+0x94/0xc0 [ 889.455270] ksys_ioctl+0xa9/0xd0 [ 889.458741] __x64_sys_ioctl+0x73/0xb0 [ 889.462655] do_syscall_64+0x1b9/0x820 [ 889.466562] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 889.471949] ? syscall_return_slowpath+0x5e0/0x5e0 [ 889.476895] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 889.481751] ? trace_hardirqs_on_caller+0x310/0x310 [ 889.486801] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 889.491832] ? prepare_exit_to_usermode+0x291/0x3b0 [ 889.496871] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 889.501737] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 889.506939] RIP: 0033:0x4573d7 [ 889.510136] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 889.529030] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 889.536755] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 00000000004573d7 [ 889.544023] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 889.551276] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 889.558551] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 889.565814] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 03:36:56 executing program 1 (fault-call:2 fault-nth:24): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x1f000000]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 889.625818] print_req_error: I/O error, dev loop4, sector 128 03:36:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000001f80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSBRK(r0, 0x5427) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) 03:36:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000700000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 889.782929] FAULT_INJECTION: forcing a failure. [ 889.782929] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 889.794778] CPU: 1 PID: 20525 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 889.803275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.803282] Call Trace: [ 889.803310] dump_stack+0x244/0x39d [ 889.803340] ? dump_stack_print_info.cold.1+0x20/0x20 [ 889.803382] should_fail.cold.4+0xa/0x17 [ 889.815329] ? fault_create_debugfs_attr+0x1f0/0x1f0 03:36:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000c0ed00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:56 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x1a0]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 889.815347] ? kobject_uevent_env+0xf76/0x101e [ 889.815371] ? wait_for_completion+0x8a0/0x8a0 [ 889.842497] ? mark_held_locks+0x130/0x130 [ 889.846774] ? kobject_uevent_env+0x100d/0x101e [ 889.851526] ? mutex_unlock+0xd/0x10 [ 889.855253] ? lo_ioctl+0xe6/0x1d60 [ 889.858918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 889.864463] ? should_fail+0x22d/0xd01 [ 889.868372] ? blkdev_ioctl+0x15d/0x2010 [ 889.872451] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 889.877570] ? blkpg_ioctl+0xc10/0xc10 [ 889.881473] ? lock_downgrade+0x900/0x900 [ 889.885650] __alloc_pages_nodemask+0x34b/0xdd0 [ 889.890336] ? kasan_check_read+0x11/0x20 [ 889.894504] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 889.899804] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 889.904852] ? find_held_lock+0x36/0x1c0 [ 889.908952] ? trace_hardirqs_off+0xb8/0x310 [ 889.913389] cache_grow_begin+0xa5/0x8c0 [ 889.917477] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 889.923035] kmem_cache_alloc+0x66b/0x730 [ 889.927251] ? fget_raw+0x20/0x20 [ 889.930733] getname_flags+0xd0/0x590 [ 889.934556] do_mkdirat+0xc5/0x310 [ 889.938112] ? __ia32_sys_mknod+0xb0/0xb0 [ 889.942287] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 889.947664] ? trace_hardirqs_off_caller+0x300/0x300 [ 889.952928] ? ksys_ioctl+0x81/0xd0 [ 889.952955] __x64_sys_mkdir+0x5c/0x80 [ 889.952975] do_syscall_64+0x1b9/0x820 [ 889.952991] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 889.953014] ? syscall_return_slowpath+0x5e0/0x5e0 [ 889.953030] ? trace_hardirqs_off_thunk+0x1a/0x1c 03:36:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x2000]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 889.953049] ? trace_hardirqs_on_caller+0x310/0x310 [ 889.953075] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 889.960582] ? prepare_exit_to_usermode+0x291/0x3b0 [ 889.960608] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 889.960632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 889.960645] RIP: 0033:0x456987 [ 889.960662] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:36:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@empty, @dev={0xfe, 0x80, [], 0x12}, @dev={0xfe, 0x80, [], 0x21}, 0x401, 0x1, 0xfff, 0x100, 0x6, 0x4000000, r2}) [ 889.960676] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 890.034597] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 0000000000456987 [ 890.041873] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 890.041883] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 890.041893] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 890.041903] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 03:36:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x7f, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f0000000040)={0xfffffffffffffffc, 0x8000, 0x3, 0x4, [], [], [], 0x8001, 0x5, 0x800, 0x4, "b91f98ffed0b5e378625947210a1f6c7"}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) 03:36:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xffffffffa0018000]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:57 executing program 1 (fault-call:2 fault-nth:25): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000ffffffffffff0700004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000ffe080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000030000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x101, 0x240100) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$vsock_stream(0x28, 0x1, 0x0) close(r2) 03:36:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x2000000000000000]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 890.303945] FAULT_INJECTION: forcing a failure. [ 890.303945] name failslab, interval 1, probability 0, space 0, times 0 [ 890.353181] CPU: 0 PID: 20559 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 890.361711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.361718] Call Trace: [ 890.361746] dump_stack+0x244/0x39d [ 890.361783] ? dump_stack_print_info.cold.1+0x20/0x20 [ 890.382571] ? __kernel_text_address+0xd/0x40 [ 890.387097] ? unwind_get_return_address+0x61/0xa0 [ 890.392045] should_fail.cold.4+0xa/0x17 [ 890.396122] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 890.396146] ? kasan_kmalloc+0xc7/0xe0 [ 890.396163] ? __kmalloc_track_caller+0x157/0x760 [ 890.396181] ? memdup_user+0x2c/0xa0 [ 890.396200] ? zap_class+0x640/0x640 [ 890.417442] ? do_syscall_64+0x1b9/0x820 [ 890.421514] ? zap_class+0x640/0x640 [ 890.425240] ? zap_class+0x640/0x640 [ 890.428973] ? find_held_lock+0x36/0x1c0 [ 890.433140] ? usnic_uiom_interval_tree_insert+0x1f8/0x260 [ 890.438797] ? perf_trace_sched_process_exec+0x860/0x860 [ 890.438814] ? lock_release+0xa10/0xa10 [ 890.438829] ? perf_trace_sched_process_exec+0x860/0x860 [ 890.438846] ? usercopy_warn+0x110/0x110 [ 890.438871] __should_failslab+0x124/0x180 [ 890.457797] should_failslab+0x9/0x14 [ 890.457817] kmem_cache_alloc_trace+0x2d7/0x750 [ 890.457839] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 890.457857] ? _copy_from_user+0xdf/0x150 [ 890.457882] copy_mount_options+0x5f/0x430 [ 890.484478] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 890.490028] ksys_mount+0xd0/0x140 [ 890.493582] __x64_sys_mount+0xbe/0x150 [ 890.497570] do_syscall_64+0x1b9/0x820 [ 890.501483] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 890.506856] ? syscall_return_slowpath+0x5e0/0x5e0 [ 890.511791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 890.516653] ? trace_hardirqs_on_caller+0x310/0x310 [ 890.521679] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 890.526706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.532254] ? prepare_exit_to_usermode+0x291/0x3b0 [ 890.537287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 890.542150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 890.547344] RIP: 0033:0x459fda [ 890.550544] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 890.569448] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 890.577160] RAX: ffffffffffffffda RBX: 00007f57c1b1eb30 RCX: 0000000000459fda [ 890.584436] RDX: 00007f57c1b1ead0 RSI: 0000000020000080 RDI: 00007f57c1b1eaf0 [ 890.591708] RBP: 0000000020000080 R08: 00007f57c1b1eb30 R09: 00007f57c1b1ead0 03:36:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xffffffff00000000]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)={'syz'}, &(0x7f0000000380)="98", 0x1, 0xfffffffffffffffd) close(r1) [ 890.598978] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 890.606251] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 03:36:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00008cffffff00000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:57 executing program 1 (fault-call:2 fault-nth:26): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000520d80", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e22, 0xffffffffffffff07, @dev={0xfe, 0x80, [], 0x10}}, {0xa, 0x4e23, 0x40, @local, 0x40}, 0x4, [0x10001, 0xf882, 0x2, 0x80, 0xd4, 0x7fffffff, 0x9, 0x5f]}, 0x5c) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r5, 0xc008ae88, &(0x7f0000000280)={0x77, 0x0, [0x4d0], [0xd901, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}) close(r1) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x4}, 0x4) 03:36:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000010000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x8001a0]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 890.845860] FAULT_INJECTION: forcing a failure. [ 890.845860] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 890.857706] CPU: 0 PID: 20590 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 890.857716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.857722] Call Trace: [ 890.857745] dump_stack+0x244/0x39d [ 890.857768] ? dump_stack_print_info.cold.1+0x20/0x20 [ 890.878205] should_fail.cold.4+0xa/0x17 [ 890.887050] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 890.887067] ? kobject_uevent_env+0xf76/0x101e [ 890.887100] ? wait_for_completion+0x8a0/0x8a0 [ 890.887129] ? mark_held_locks+0x130/0x130 [ 890.909649] ? kobject_uevent_env+0x100d/0x101e [ 890.914344] ? mutex_unlock+0xd/0x10 [ 890.918062] ? lo_ioctl+0xe6/0x1d60 [ 890.921702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 890.927239] ? should_fail+0x22d/0xd01 [ 890.931132] ? blkdev_ioctl+0x15d/0x2010 [ 890.935203] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 890.940311] ? blkpg_ioctl+0xc10/0xc10 [ 890.944229] ? lock_downgrade+0x900/0x900 [ 890.948434] __alloc_pages_nodemask+0x34b/0xdd0 [ 890.953130] ? kasan_check_read+0x11/0x20 [ 890.957287] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 890.962572] ? __alloc_pages_slowpath+0x2dd0/0x2dd0 [ 890.967637] ? find_held_lock+0x36/0x1c0 [ 890.971773] ? vhci_urb_dequeue+0x88/0x8a0 [ 890.976038] ? trace_hardirqs_off+0xb8/0x310 [ 890.980455] cache_grow_begin+0xa5/0x8c0 [ 890.984521] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 890.990071] kmem_cache_alloc+0x66b/0x730 [ 890.994223] ? fget_raw+0x20/0x20 [ 890.997684] getname_flags+0xd0/0x590 [ 891.001488] do_mkdirat+0xc5/0x310 [ 891.005037] ? __ia32_sys_mknod+0xb0/0xb0 [ 891.009186] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.014556] ? trace_hardirqs_off_caller+0x300/0x300 [ 891.019668] ? ksys_ioctl+0x81/0xd0 [ 891.023304] __x64_sys_mkdir+0x5c/0x80 [ 891.027197] do_syscall_64+0x1b9/0x820 [ 891.031085] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 891.036456] ? syscall_return_slowpath+0x5e0/0x5e0 [ 891.041392] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 891.046250] ? trace_hardirqs_on_caller+0x310/0x310 [ 891.051269] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 891.056290] ? prepare_exit_to_usermode+0x291/0x3b0 [ 891.061329] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 891.066207] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 891.071398] RIP: 0033:0x456987 [ 891.074594] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 891.093497] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 891.101202] RAX: ffffffffffffffda RBX: 0000000020000110 RCX: 0000000000456987 [ 891.108471] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 891.115742] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 891.123008] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 891.130283] R13: 0000000000000000 R14: 00000000004d7d88 R15: 0000000000000003 03:36:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x1000000]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a0000000000000000007a004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000000580", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x20000000]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7ff) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x9) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) ioctl(r0, 0x7fff, &(0x7f0000000200)="4b6a6b9289086dcd623fa7a2b3da27ae5a5f06d898748c8a2f5517a427a7d5368646a3ed4d31fb6290117c0194b1bede0942dfb9b18f2764adc2d0333ec64168b03e02a2135a2a96b1de7644ca1284a98350fd0b0c7d24805d0ba12ac30dbdd0153d1143bf8c5f92964bd9c0fcde20e31ddaba02ec8a646c8726c493f44f6087371e022843db2949aa7c8930bf20b3a3c6e3dd9f0a5a793ade32528aa961972ccd4e545452166427dc3338c0e8cfb59a323a449cf4a8f495f650b8c6691db71c402b97d8b52219539d2d771d0b09053d0dc1d45ce266661e52dcdbda35fdd1a3196d362ce9ff1082d62ad65f0016f63a98481741fcf4fefb2798837dbd1a1d7b7170cb3ca8960f6e3868994ce53dfb7ebd816e4e08e9a55e91a6d1bdc205fa20643a688991b80c8b783ab34f2b4c3b4846273c6b8ce8f13a3a23d121710b8cc86c07b2fc5d707e1478f37bf96d5444aa7cd1d0d46c59061c1dd1bd0f1e9541c7e5b0aa91738ffc373f3f7f2eb46778fad75077cd75a450cce94c9b03be98a88f5a0a37669dca0dcf9731af3ec80e6220dc8c42d0592c3a7e54f8d5706164239cfada69a34dc0dfb2cbcac27ff15719e91b5c60a2cc472e3912eef35af16078e0ff0598eae41157f3e7e53fa2381b2be21591a211dfe711e24ffe46510f787bfcc99ed5b3306ba50ac3fb8219fffd466d064c707992d226f89a11c3ac014eac216adf322368a0edaf7d490deb11de9494d9a049428762c848c7580ebd94b3fc096d78deb2ab4c97b66ed0a3145d398619e4c31485b78dffac1b6faebf248f7c07faf3f7908c1ffc8174fef22826d3fcc7829677a00e76c93e77e9c1aaa1374f9014e7635addd926695cc57371e946439b26ec884306ff1a2b8d57e4a6d6899dfe407b3ec5fe7006e1de654e2fb47c76b1d139c3e9f5c52fbb916765ee040a76125fde2f552a83c3ec5cca3c9f83e60ea7edf8e5762172413cbe6cf5858dae282e272c9f202f2bdac485ebaff038114396baba078475487dde19ab7833f199a3620018bae5ed0930bc5fd82f0571c31b42dfa63edf0eaaa6833c15852c7b962914bc5ba1c390f7fa032bd2d1ab7bb6e9df5baf7c26cc5d35e300350f7708c9fad4bf7078ff65a1b565753e7619c79af009ca42d5c118116aea924aaad8122fdc9f871aeffd85c80fd5d7f1ceafd61ac915501234f4858b1b231af77cb042434e6d384dd220371ee401a71036a6e79cb60c1183366c438338b8102e833676e466a8d68e751afb138b936640a70ff311d1e3267de6cbaef0ab4104af87bf3b4145e2b98436205973d9a7af0d61d34348b4f3e32fb39baf31a0e1bd1ada5b34c5adf357978959051daa817b3d9ba9ec06a9ff7f9ffa14c480f8c31020ee6d88e1a19da0f220a54f83181510c8e9414153b97fef42e81312278784b43449906a955f161c484a8ca0ed5d714eff957683958044701cfd6e0bbe300cf11f2cc30bf396e9e5f499603823501cc93fd7489233ab0f66628258e776840564bc9086914296b9a8a0f6062cbd1c2ee51564aad5599ce2ecf79482cfacc1a9e79b9dd0fe833c34f482369d94723b986c27e38d8ed6d7270e828f5a82ff67ab59b5ceca5ae4a62484f035e1b8da39a788b342e06ffdfd4b6bea142da7fac0a6021400cb9f7019ccd61e0d73eaaa721f3ff7d8ad923709c7793125459623b2509170b8020a92d9c8db47899175d69afca6318cc3a27860d4dfe0da8f58204937d860e371328a04ea7abe64f885cb61d7295f4fa3e9fe9372d763dc166b7e3eaa7d76b7ed4bb865185e1e981297d613e44ff1d3cd77783c4c0e02bf6bfee1291bde43852325abc4a871103d2d99e583b5f7a10f65d54f8951a3ed780ea9b50269c84172c9e23595ac2721486f611832e3de93c20249ad847660e67f05b0d34159446a41df41ff6d583e8dbb2479c9afec7bb9461986e76398e371a902faca563bcd7c9eeb5688ab97988681f4fb3865ddeacfce95654bed71665ab14df323c4ccf1338c540f4c9c84655ae799f5b7d09798d1c4d7e6698569de0b1292ff06cd8c17bba71bf1e1a441144b525c637a245961c717a09fc09feb4b11b3cd14ad8eaa2a296703a80920366254fbd6a2e3b3af788070d783046d2a67618912e9310c6587b11e8ae42ee14cf70d84368a4426edb7de49fa36ffac494811ba474437b7d0ff294c0792246c94e4985bc589a962a5587aec7229ceab43476b2501ad92a994d6e60e974676ec2a44c493c891c1cb1332b282b41c9bb485ee10355b96e99ce71727242c97a8c3a0bfab7320f30d458f58dae1c575c244de753bfbc6e3a9d6a10ca87c520c1cd0498c7dd1e1264ae71f7aa5c5301e029812fa1ade696b7f3dc9997b5560d7fb0596115d60de0b1052aae255de62adac2f887cfadcb745b760b83336a1c25a229d7aec15a8a7043a9e3ab3fa4935f2c908b3c3a4a5d45cca267d0f2f92718446e423db81f36ba84e55165e6c0ad700a6548b217681a3d1638ab6c3794c10479dd0444974d474bc5b504b5d5f5eb1c2edf65a7e1d521a593c95b75e70e1548c10c88790d2a3301edf345e028cedef7ff2f94b74bf28b3e5d2e13b063cec1efc2eb82502ab64abcc0f69d3f32589f896dae9c48d21dafe46d06b488aeaa0ce6d82b412a38723cc31aacdecd8eaf49ba5d3f5d1a37e1771011c2924d2defd0670396ab6eeb26995ab665fcd421b0e51a1966e7436058b7a9729b4b060ed6ea766b4aec03343893f819e621b5d5b7d9f0d5c71657d906210b14c69961423351f611b046d16381f5681f5a4dc71794f28aabebb80eb9518a2715b756cb751e6a0bd9d61a0394599a10dc2a8114ddec5f7bc72b74b7e8ccee68f6d1b464aeac11a249d2bbae60910775aa2fa228888503279cd07af4f5b07d37a8ae76807047a5092672f0ba6d079b6957d96f77e751081142bfc1499439fb7deac895e886a8f96f8a0295ca07095cb97988159bb77137023695920878cbe4edcd875f18411b06e277827e0d1115764436cbd2326d4e4d6cd1acbfd245ecf6704e97bcd1625f287c01167d969fe43a01b64c2819ebe5027d51b7cb12214b4172854fb35b451b355c88ec1b238cacd1d3c623de762e3a18b431a399dd0689e20291e857a4381881547d0fd3011f0b1551ef7dcc271f6e8aae2a6f979a912fe02005796b085eecc5c457a0747febd763eec597aef127c8205a256af5bbb18ae04214a8b418da33e9df2c108c8a8de6adaf7e117fd9c284c6fc65326a7b4c3c0562ebb5a2d58294aab551648f3c4f7020b0e19c49b6350396c199b1af2af4ca5d681bbfba62711e794c7f94fd7958caf470633c3e7cb9242903c4c2b4ad32214662e224f45d308875b0df3aea2945c007aaa2d24d250e3c3735c1dd2a5fe242cb1a1d8241c93082870e796a15bcfc88eed4638477d5904147179b95ddc9892b22873fca0c9be8bdd4d558e417f5d87bf81269127ee5b3d494a2fb1524ed413c814eea7aac8d102b20f0df82ddd24f335d0caf60a5d65381c2de93ca2a0af2862b372481bafa06efc59e34c5ce72c12a8a9696025d9cc93406ef3b3ef3d4d8a380d68a009dbdd8023e8b95116e39e44582fa38466e99d0a424bf9642786590bef1c2760782c20d148ad8acac03ce0d319424bd298cba7a751f46911973388dc99746783857bec49f1f70a7a3b533848edb29829cd4984ec08a4067e44cd6463733fb521790dd28dac662d67071254e3996e092944d7cd233b002814a3fdfd9b2f7b0491952bd6cb3355da8b28787677dac12f38cfa391a3893c9ce3aa3a9f6f7f6c9ad097cfe7e99a0c11a315fd4d2d5d4ac1f5555b40d2fb01b7aeaec80b1bd59b5a9c82ac000cac70c2569224602b780b81abcbd19cb5d97f29d8f5523cf45b3ab946c4218257bfdc3f51160c9ff2c87d1735caba6ef195d27460fe7efbe12ad0fe6595d92a7fe808fdb46628071ba77470a6886bbf7f0c6703f3eee74c3d65814e28feaa6a25208a1cf79538760a600e130322e922097b2a538344694fded6199ae2831eba7403976f705995f1ff1b86cde17397f86f4e944dbad6f66ce64d0ffd246b5aecc289fb660f47edaccf3e6a20cc1e16361efc72b9530fbbd51439c82a63569c0118cf9017710767f400a73e94c92cf97c10384cf1f47ed7c41b4d5c7d2bdef7b479385035ecbb3fc74fb786a05eb863622a79d6593deee82061948b6c113a2863c72e08f4655043240c967fc87f6ed38fc37f088d94fb90488ddd1ae4a5c85ed9c426c015cb34c51acae1a27301c41d2597c839969c2dae9e511b3c79b7fe88454b3eeb60b6df5b05ba6251622653f11773c917b94f033a3bd030951c1b6e596d718e195f31d113da820d2f78588663e2865309c7bf974461d8bed3562fb2c3581f625f76b06b717cf7884079bfbb4fb2fae3f64a5eaea61f290d8427d6bd50181c5808e5649d743bc416f093640d08652f0e83608e95a1f89bec65ca99f83fe77ecc873d7a90ef8fef57859bc32ffe44520d39a2aea490448e740ec1194519436e0842c62c48b620b2cee6864a7463e3bc1e3ecf7aba20a33a8e6ca71a6b8af00f90a63e604f42ccb9d09db4b0e8084c9ec8561d98624ede54879a115eaa459fc2195a93b50d7208234f0c53b4485a026201c3a4c005d3349a377c720ad0ab06bfa3daddab9a7bdcfb9bdd31cf133f5b404cf5990e7eea76da56bdede5d253fec3e38c6e4b746366b4dcb141e7ec0a0f46f1b8f154830d0735bcc6763c7a09bba263925addcb37372a56d50820e920b5eef1d7bf752e6652a7c787a50f99e5ce9a03e0abb186b6c2c79d7d2aaf417ccf24835cfbd34be9b1a0456419920e772e85b92b7af5c70cac58a90068ed821a4963a8200a82e4dfcd6609f1671ee1e97348ea7ca9fb44968f5f1441f035b13d89920255fd9c23b49d6ec1cc0af1a560266db7854e166766efe1a4af38c630a2a9ed824af94d1b25570682fb010b4de9201c2fdfc725ff574e86921c643d582755d70e0a4e128dd28e557fcc3832abfdd33ab237af5f00cc23eb20d8da2b6e33d58096fd18cb94badc708708ee6cf877078949415be951a3f60c5a1f3c5cb862177ecb71216adcbcf144cec1570946c5cf35070783261a9ed7e8d72fc73a5a9fa083dbf92f888c6a885366cf8d07a82f6cf4d9518e9fd03321b5f829adf901b15898b2bd30aeecc287f25db9989808afee5e3de28dcde6266bbfd0bdbd9ff6f0fe828e81ea123a28e56a2c002f1bb1db3aacc21fd075f361d756a683b1226d93e4563f34db58a264bf9de33b17ae86c959e19be7ba9a115f79b45f553017fa0a9034f01713e4b85f01dc466f48310618207674bfc48a3cab15ae8b1dbe300a923c2e55d18e6cb543e6c2955436a9579b965d1ad53797c8ae855d3c0517ac958fb9f27982b1697fa307b157c8f246b55e426626d45d680e6074ad0e3bb8d7744516cfe066d9bd3730f77ea76b7de7a1572430d85f272edce4e040512275a0644828d0f8abc789fa4e390f644a3a98e6615f445eb8a5ca0368662430979ea146036fb9e972600c8a470e7773e50f804cff743c242109a412527663a49fa185a317f6df162f3711daed5b288646fa38a9b1926114e95eb64971523b403420193c66c92b848294ffdc46089edd4c934b083c2ee837eae6620e642b5d1a0eea592b56eddd3d97bb0583c300bf1978e83f8e289049606b0ddbf064b8abdcaf5dcb4b507bc8967f41a9690a111ea0f33ba01a7dda26aaffcdd20345") write$P9_RXATTRWALK(r0, &(0x7f00000000c0)={0xf, 0x1f, 0x2, 0xfff}, 0xf) 03:36:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000070000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r0, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) [ 891.517212] EXT4-fs: 11 callbacks suppressed [ 891.517224] EXT4-fs (sda1): re-mounted. Opts: [ 891.535969] EXT4-fs (sda1): re-mounted. Opts: [ 891.560723] EXT4-fs (sda1): re-mounted. Opts: 03:36:58 executing program 1 (fault-call:2 fault-nth:27): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000400080", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xa4ffffff]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000100004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6f4) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x10, &(0x7f00000000c0)={&(0x7f0000000080)=""/33, 0x21, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r2, 0x10, &(0x7f0000000140)={&(0x7f0000000040)=""/15, 0xf, r3}}, 0x10) close(r1) ioctl$VT_RELDISP(r2, 0x5605) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000200)=0x65, 0x8) 03:36:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000001a00000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:58 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000040)="0000004880", &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x100020, &(0x7f0000000200)) 03:36:58 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x100000000000000]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) 03:36:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) recvfrom(r0, &(0x7f0000000040)=""/205, 0xcd, 0x40, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r0, r0, 0xb, 0x3}, 0x10) socket$vsock_stream(0x28, 0x1, 0x0) close(r0) [ 891.753868] print_req_error: I/O error, dev loop4, sector 128 [ 891.790700] EXT4-fs (sda1): re-mounted. Opts: 03:36:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a000000001c0000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000000)) 03:36:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000300000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb", 0x8b, 0x10000}], 0x0, &(0x7f0000000000)) [ 891.861665] EXT4-fs (sda1): re-mounted. Opts: 03:36:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xb5b) r1 = socket$vsock_stream(0x28, 0x1, 0x0) close(r1) 03:36:59 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [0xa4ffffff00000000]}}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) [ 891.981494] FAULT_INJECTION: forcing a failure. [ 891.981494] name failslab, interval 1, probability 0, space 0, times 0 [ 892.003806] CPU: 1 PID: 20660 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 892.012324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.021694] Call Trace: [ 892.024309] dump_stack+0x244/0x39d [ 892.027966] ? dump_stack_print_info.cold.1+0x20/0x20 [ 892.033176] ? filename_lookup+0x39a/0x520 [ 892.037429] ? user_path_at_empty+0x40/0x50 [ 892.041764] ? do_mount+0x180/0x1d90 [ 892.045489] ? ksys_mount+0x12d/0x140 [ 892.049306] ? do_syscall_64+0x1b9/0x820 [ 892.053391] should_fail.cold.4+0xa/0x17 [ 892.057478] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 892.063113] ? mntput+0x74/0xa0 [ 892.066427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.071979] ? check_preemption_disabled+0x48/0x280 [ 892.077023] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 892.082582] ? find_held_lock+0x36/0x1c0 [ 892.086768] ? em_fninit+0x58/0x150 [ 892.090429] ? filename_lookup+0x39f/0x520 [ 892.094679] ? perf_trace_sched_process_exec+0x860/0x860 [ 892.100155] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 892.105727] __should_failslab+0x124/0x180 [ 892.109984] should_failslab+0x9/0x14 [ 892.113801] kmem_cache_alloc_trace+0x2d7/0x750 [ 892.118492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.124054] vfs_new_fs_context+0x5e/0x77c [ 892.128303] ? ns_capable_common+0x13f/0x170 [ 892.132733] do_mount+0xb70/0x1d90 [ 892.136295] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 892.141851] ? copy_mount_string+0x40/0x40 [ 892.146110] ? copy_mount_options+0x5f/0x430 [ 892.150540] ? kmem_cache_alloc_trace+0x353/0x750 [ 892.155401] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 892.160955] ? _copy_from_user+0xdf/0x150 [ 892.165121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.170680] ? copy_mount_options+0x315/0x430 [ 892.175193] ksys_mount+0x12d/0x140 [ 892.178838] __x64_sys_mount+0xbe/0x150 [ 892.182838] do_syscall_64+0x1b9/0x820 [ 892.186740] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 892.192121] ? syscall_return_slowpath+0x5e0/0x5e0 [ 892.197096] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 892.201993] ? trace_hardirqs_on_caller+0x310/0x310 [ 892.207052] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 892.212078] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.217644] ? prepare_exit_to_usermode+0x291/0x3b0 [ 892.222686] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 892.227554] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.232756] RIP: 0033:0x459fda [ 892.235962] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 892.255390] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 892.263108] RAX: ffffffffffffffda RBX: 00007f57c1b1eb30 RCX: 0000000000459fda [ 892.270388] RDX: 00007f57c1b1ead0 RSI: 0000000020000080 RDI: 00007f57c1b1eaf0 [ 892.277669] RBP: 0000000020000080 R08: 00007f57c1b1eb30 R09: 00007f57c1b1ead0 [ 892.284946] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 892.292223] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 892.308314] BUG: unable to handle kernel paging request at fffffffffffffff4 [ 892.315437] PGD 926d067 P4D 926d067 PUD 926f067 PMD 0 [ 892.320736] Oops: 0000 [#1] PREEMPT SMP KASAN [ 892.325248] CPU: 1 PID: 20660 Comm: syz-executor1 Not tainted 4.19.0-rc8-next-20181018+ #97 [ 892.333736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.343103] RIP: 0010:do_mount+0xb98/0x1d90 [ 892.347456] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 892.366363] RSP: 0018:ffff880185d27c28 EFLAGS: 00010246 [ 892.371735] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90003e7a000 [ 892.379004] RDX: 1ffffffffffffffe RSI: ffffffff81e0147c RDI: 0000000000000282 [ 892.386287] RBP: ffff880185d27db0 R08: ffff88018114c040 R09: ffffed003b5e5b4f [ 892.393580] R10: ffffed003b5e5b4f R11: ffff8801daf2da7b R12: ffff880182b75630 [ 892.400860] R13: ffff8801c944cb00 R14: ffff8801c944cb00 R15: ffff88018bd50b00 [ 892.408142] FS: 00007f57c1b1f700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 892.416385] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 892.422277] CR2: fffffffffffffff4 CR3: 00000001ccda0000 CR4: 00000000001406e0 [ 892.429550] Call Trace: [ 892.432186] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 892.437777] ? copy_mount_string+0x40/0x40 [ 892.442026] ? copy_mount_options+0x5f/0x430 [ 892.446483] ? kmem_cache_alloc_trace+0x353/0x750 [ 892.451365] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 892.456925] ? _copy_from_user+0xdf/0x150 [ 892.461087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.466638] ? copy_mount_options+0x315/0x430 [ 892.471154] ksys_mount+0x12d/0x140 [ 892.474794] __x64_sys_mount+0xbe/0x150 [ 892.478786] do_syscall_64+0x1b9/0x820 [ 892.482683] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 892.488060] ? syscall_return_slowpath+0x5e0/0x5e0 [ 892.492997] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 892.497857] ? trace_hardirqs_on_caller+0x310/0x310 [ 892.502882] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 892.507996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 892.513543] ? prepare_exit_to_usermode+0x291/0x3b0 [ 892.518568] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 892.523433] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 892.528632] RIP: 0033:0x459fda [ 892.531836] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 892.550743] RSP: 002b:00007f57c1b1ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 892.558453] RAX: ffffffffffffffda RBX: 00007f57c1b1eb30 RCX: 0000000000459fda [ 892.565725] RDX: 00007f57c1b1ead0 RSI: 0000000020000080 RDI: 00007f57c1b1eaf0 [ 892.573000] RBP: 0000000020000080 R08: 00007f57c1b1eb30 R09: 00007f57c1b1ead0 [ 892.580273] R10: 0000000000100020 R11: 0000000000000206 R12: 0000000000000004 [ 892.587543] R13: 0000000000100020 R14: 00000000004d7d88 R15: 0000000000000003 [ 892.594833] Modules linked in: [ 892.598027] CR2: fffffffffffffff4 [ 892.601487] ---[ end trace 0cfb044b9e76bd84 ]--- [ 892.606250] RIP: 0010:do_mount+0xb98/0x1d90 [ 892.610576] Code: 06 00 48 89 c2 48 89 c3 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 8a 11 00 00 48 b8 00 00 00 00 00 fc ff df <4c> 8b 33 49 8d 7e 18 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 5e 11 [ 892.629489] RSP: 0018:ffff880185d27c28 EFLAGS: 00010246 [ 892.634857] RAX: dffffc0000000000 RBX: fffffffffffffff4 RCX: ffffc90003e7a000 [ 892.642171] RDX: 1ffffffffffffffe RSI: ffffffff81e0147c RDI: 0000000000000282 [ 892.649439] RBP: ffff880185d27db0 R08: ffff88018114c040 R09: ffffed003b5e5b4f [ 892.656708] R10: ffffed003b5e5b4f R11: ffff8801daf2da7b R12: ffff880182b75630 [ 892.663980] R13: ffff8801c944cb00 R14: ffff8801c944cb00 R15: ffff88018bd50b00 [ 892.671254] FS: 00007f57c1b1f700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 892.679476] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 892.685355] CR2: fffffffffffffff4 CR3: 00000001ccda0000 CR4: 00000000001406e0 [ 892.692635] Kernel panic - not syncing: Fatal exception [ 892.698887] Kernel Offset: disabled [ 892.702508] Rebooting in 86400 seconds..